Research, Education, and Cybersecurity Policies in India

IIIT Hyderabad
IIIT Hyderabad IIIT Hyderabad
Research,	
  Education,	
  and	
  
Cybersecurity	
  Policies	
  in	
  India
Cybersecurity	
  Governance:	
  A	
  Data-­‐Driven	
  Approach	
  
Harvard	
  University	
  
Oct	
  13,	
  2016
Ponnurangam	
  Kumaraguru	
  (“PK”)
Associate	
  Professor
Founding	
  Head,	
  CERC	
  
fb/ponnurangam.kumaraguru,	
  @ponguru
Who	
  am	
  I?	
  
– Associate	
  Professor,	
  IIIT-­‐Delhi	
  	
  
– Ph.D.	
  from	
  School	
  of	
  Computer	
  Science,	
  	
  
Carnegie	
  Mellon	
  University	
  (CMU)	
  	
  
– Research	
  interests	
  
-Cybersecuirty,	
  Social	
  Computing,	
  Computational	
  
Social	
  Science,	
  Complex	
  Networks	
  pertaining	
  to	
  
Human	
  Behavior,	
  specifically	
  in	
  the	
  context	
  of	
  
Security	
  &	
  Privacy
– Co-­‐ordinate	
  and	
  manage	
  Precog,	
  
precog.iiitd.edu.in
– ACM	
  Distinguished	
  Speaker	
  
2
https://www.youtube.com/channel/UCHWDvG
Dh4QjWbV79bM2neSg
3
4
What	
  we	
  dabble	
  with!	
  
5
http://meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20(1).pdf
6
http://cerc.iiitd.ac.in/
7
NSC	
  /	
  NCSC	
  
8
NSC	
  /	
  NCSC	
  
OSN	
  for	
  Policing:	
  Boston	
  
9
OSN	
  for	
  Policing:	
  BLR	
  
10
OSN	
  for	
  Policing:	
  BLR	
  
11
12
13
14
Policies:	
  Micro	
  Mission	
  	
  
15
Bridging	
  the	
  gap	
  
– Officers	
  
– Teachers	
  
– Students	
  
16
Bridging	
  the	
  gap
17
18
Accounts	
  in	
  the	
  country!	
  
19
http://precog.iiitd.edu.in/research/osm-­‐policing-­‐india/handles.html
Analyzing	
  Accounts	
  
20
http://precog.iiitd.edu.in/research/osm-­‐policing-­‐india/analyse/
21
20	
  Interviews 4	
  FGDs
10,427	
  Surveys
#privacyindia12	
  Methodology
18	
  months!
0.08
7.73
0.14
7.10
1.10
6.88
0.28
8.14
1.96
8.58
0.52
0.21
0.74
3.19
9.38
0.35
0.03
0.04
0.25
2.94
11.29
0.02
8.57
0.05
9.39
9.53
0.21
0.17
9.390.48
0.02
0.03
0.01
0.08
Sample	
  
Demographics
Gender	
  (N=	
  10,232)
Male 67.57
Female 32.43
23
Age	
  
(N=10,350)
<18 1.54
18-­‐24 21.31
25-­‐29 32.20
30-­‐39 25.90
40-­‐49 14.09
50-­‐64 4.46
65+ 0.50
Age
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
24
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
  
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
25
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
   42.13	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
  
Internet	
  &	
  Social	
  Media
What	
  do	
  you	
  feel	
  about	
  privacy	
  of	
  your	
  personal	
  
information	
  on	
  your	
  OSN?	
  
26
Q42,	
  N	
  =	
  6,855
It	
  is	
  not	
  a	
  concern	
  at	
  all	
   19.30	
  
Since	
  I	
  have	
  specified	
  my	
  privacy	
  settings,	
  my	
  
data	
  is	
  secure	
  from	
  a	
  privacy	
  breach	
   42.13	
  
Even	
  though,	
  I	
  have	
  specified	
  my	
  privacy	
  
settings,	
  I	
  am	
  concerned	
  about	
  privacy	
  of	
  my	
  
data	
   23.84	
  
It	
  is	
  a	
  concern,	
  but	
  I	
  still	
  share	
  personal	
  
information	
   8.02	
  
It	
  is	
  a	
  concern;	
  hence	
  I	
  do	
  not	
  share	
  personal	
  
data	
  on	
  OSN	
   6.71	
  
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
27
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
28
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
29
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender 27.39
People	
  from	
  my	
  hometown
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know)
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with
Anyone 2.99
Internet	
  &	
  Social	
  Media
If	
  you	
  receive	
  a	
  friendship	
  request	
  on	
  your	
  most	
  
frequently	
  used	
  OSN,	
  which	
  of	
  the	
  following	
  people	
  
will	
  you	
  add	
  as	
  friends?	
  
30
Q43,	
  N	
  =	
  6,929
Person	
  of	
  opposite	
  gender 27.39
People	
  from	
  my	
  hometown 19.51
Person	
  with	
  nice	
  profile	
  picture 10.12
Strangers	
  (people	
  you	
  do	
  not	
  
know) 4.99
Somebody,	
  whom	
  you	
  do	
  not	
  
know	
  or	
  recognize	
  but	
  have	
  
mutual	
  /	
  common	
  friends	
  with 8.31
Anyone 2.99
Takeaways
– Cybersecurity	
  is	
  a	
  complex	
  and	
  a	
  multi-­‐
faceted	
  area	
  /	
  problem	
  
– Attempts	
  are	
  being	
  made	
  in	
  different	
  
directions	
  
– More	
  empirical	
  data	
  /	
  analysis	
  needed	
  
– Long	
  way	
  to	
  go	
  for	
  India!	
  
31
Thank	
  you
pk@iiitd.ac.in
precog.iiitd.edu.in
fb/ponnurangam.kumaraguru
1 of 32

Recommended

Credibility, Identity Resolution, and Privacy on Online Social Media by
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media IIIT Hyderabad
298 views34 slides
Credibility, Identity Resolution, and Privacy on Online Social Media by
Credibility, Identity Resolution, and Privacy on Online Social Media Credibility, Identity Resolution, and Privacy on Online Social Media
Credibility, Identity Resolution, and Privacy on Online Social Media IIIT Hyderabad
397 views38 slides
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media by
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaCredibility, Identity Resolution, Privacy, and Policing in Online Social Media
Credibility, Identity Resolution, Privacy, and Policing in Online Social MediaIIIT Hyderabad
605 views30 slides
Keynote at 4th International Symposium on Secuirty in Computing at Communicat... by
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...IIIT Hyderabad
506 views40 slides
IGDTUW workshop by
IGDTUW workshopIGDTUW workshop
IGDTUW workshopIIIT Hyderabad
357 views26 slides
Online Social Media: Opportunities, Challenges, and Pitfalls by
Online Social Media: Opportunities, Challenges, and Pitfalls Online Social Media: Opportunities, Challenges, and Pitfalls
Online Social Media: Opportunities, Challenges, and Pitfalls IIIT Hyderabad
2.5K views23 slides

More Related Content

What's hot

20110128 connected action-node xl-sea of connections by
20110128 connected action-node xl-sea of connections20110128 connected action-node xl-sea of connections
20110128 connected action-node xl-sea of connectionsMarc Smith
1.4K views57 slides
Презентация Леонида Жукова: От микромотивов до макроповедения by
Презентация Леонида Жукова: От микромотивов до макроповеденияПрезентация Леонида Жукова: От микромотивов до макроповедения
Презентация Леонида Жукова: От микромотивов до макроповеденияGreenfieldProject
3.3K views44 slides
I3 presentation john mowbray by
I3 presentation john mowbrayI3 presentation john mowbray
I3 presentation john mowbrayJohn Mowbray
460 views31 slides
Altmetrics: Listening & Giving Voice to Ideas with Social Media Data by
Altmetrics: Listening & Giving Voice to Ideas with Social Media DataAltmetrics: Listening & Giving Voice to Ideas with Social Media Data
Altmetrics: Listening & Giving Voice to Ideas with Social Media DataToronto Metropolitan University
1.1K views40 slides
Is the Age of privacy over? Facebook, Privacy and Qualitative Research by
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative ResearchLisa Blenkinsop
873 views15 slides
Scholarly Identity 2.0: What does the Web say about your research? by
Scholarly Identity 2.0: What does the Web say about your research?Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?Michael Habib
2K views49 slides

What's hot(16)

20110128 connected action-node xl-sea of connections by Marc Smith
20110128 connected action-node xl-sea of connections20110128 connected action-node xl-sea of connections
20110128 connected action-node xl-sea of connections
Marc Smith1.4K views
Презентация Леонида Жукова: От микромотивов до макроповедения by GreenfieldProject
Презентация Леонида Жукова: От микромотивов до макроповеденияПрезентация Леонида Жукова: От микромотивов до макроповедения
Презентация Леонида Жукова: От микромотивов до макроповедения
GreenfieldProject3.3K views
I3 presentation john mowbray by John Mowbray
I3 presentation john mowbrayI3 presentation john mowbray
I3 presentation john mowbray
John Mowbray460 views
Is the Age of privacy over? Facebook, Privacy and Qualitative Research by Lisa Blenkinsop
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Lisa Blenkinsop873 views
Scholarly Identity 2.0: What does the Web say about your research? by Michael Habib
Scholarly Identity 2.0: What does the Web say about your research?Scholarly Identity 2.0: What does the Web say about your research?
Scholarly Identity 2.0: What does the Web say about your research?
Michael Habib2K views
From Academic Library 2.0 to (Literature) Research 2.0 by Michael Habib
From Academic Library 2.0  to (Literature) Research 2.0From Academic Library 2.0  to (Literature) Research 2.0
From Academic Library 2.0 to (Literature) Research 2.0
Michael Habib2.4K views
Scholarly Reputation Management Online : The Challenges and Opportunities of ... by Michael Habib
Scholarly Reputation Management Online: The Challenges and Opportunities of ...Scholarly Reputation Management Online: The Challenges and Opportunities of ...
Scholarly Reputation Management Online : The Challenges and Opportunities of ...
Michael Habib1.2K views
Thesis social media sites - recruitements by Divya Mishra
Thesis   social media sites - recruitementsThesis   social media sites - recruitements
Thesis social media sites - recruitements
Divya Mishra1.5K views
Zurich Blogging Dangerous March24 2007 by evgeny.morozov
Zurich Blogging Dangerous March24 2007Zurich Blogging Dangerous March24 2007
Zurich Blogging Dangerous March24 2007
evgeny.morozov258 views
Virin 2008 new ways by Fedor Virin
Virin 2008 new waysVirin 2008 new ways
Virin 2008 new ways
Fedor Virin285 views

Viewers also liked

Privacy in India: Attitudes and Awareness V 2.0 by
Privacy in India: Attitudes and Awareness V 2.0Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0IIIT Hyderabad
1.1K views50 slides
Us desk quarterly newsletter september 2016 edition by
Us desk quarterly newsletter   september 2016 editionUs desk quarterly newsletter   september 2016 edition
Us desk quarterly newsletter september 2016 editionQuentin Van Gansberghe
245 views19 slides
Teams n°6 by
Teams n°6Teams n°6
Teams n°6Carole Galland
365 views9 slides
Consenso informato slide-introduttive by
Consenso informato slide-introduttiveConsenso informato slide-introduttive
Consenso informato slide-introduttiveautoformazione
553 views5 slides
company profile-S20.5 (4) by
company profile-S20.5 (4)company profile-S20.5 (4)
company profile-S20.5 (4)Samar Adib Itani سمرعيتاني
295 views15 slides
René swieringa - Met de kudde de berg op by
René swieringa - Met de kudde de berg opRené swieringa - Met de kudde de berg op
René swieringa - Met de kudde de berg opPraktijkcentrum
729 views9 slides

Viewers also liked(20)

Privacy in India: Attitudes and Awareness V 2.0 by IIIT Hyderabad
Privacy in India: Attitudes and Awareness V 2.0Privacy in India: Attitudes and Awareness V 2.0
Privacy in India: Attitudes and Awareness V 2.0
IIIT Hyderabad 1.1K views
Consenso informato slide-introduttive by autoformazione
Consenso informato slide-introduttiveConsenso informato slide-introduttive
Consenso informato slide-introduttive
autoformazione553 views
René swieringa - Met de kudde de berg op by Praktijkcentrum
René swieringa - Met de kudde de berg opRené swieringa - Met de kudde de berg op
René swieringa - Met de kudde de berg op
Praktijkcentrum729 views
Comunicare e promuovere la salute ai tempi dei social media by Eugenio Santoro
Comunicare e promuovere la salute ai tempi dei social mediaComunicare e promuovere la salute ai tempi dei social media
Comunicare e promuovere la salute ai tempi dei social media
Eugenio Santoro327 views
Finance responsable et solidaire - by JEGARD
Finance responsable et solidaire - Finance responsable et solidaire -
Finance responsable et solidaire -
JEGARD1.7K views
Design failure modes and effects analysis (dfmea) of an all terrain vehicle by eSAT Journals
Design failure modes and effects analysis (dfmea) of an all terrain vehicleDesign failure modes and effects analysis (dfmea) of an all terrain vehicle
Design failure modes and effects analysis (dfmea) of an all terrain vehicle
eSAT Journals2.3K views
Sejarah Koperasi di Indonesia by anditaeka
Sejarah Koperasi di IndonesiaSejarah Koperasi di Indonesia
Sejarah Koperasi di Indonesia
anditaeka6.1K views
Social network e professione infermieristica: una narrative review by Cristiano Radice
Social network e professione infermieristica: una narrative reviewSocial network e professione infermieristica: una narrative review
Social network e professione infermieristica: una narrative review
Cristiano Radice1.5K views
Privacy and Security in Online Social Media : Intro to OSM by IIIT Hyderabad
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
IIIT Hyderabad 838 views
Wealthfront & Betterment: Democratizing The Investment Process by Jackson Moses
Wealthfront & Betterment: Democratizing The Investment ProcessWealthfront & Betterment: Democratizing The Investment Process
Wealthfront & Betterment: Democratizing The Investment Process
Jackson Moses1.9K views
Homeobox genes (2) /certified fixed orthodontic courses by Indian dental acad... by Indian dental academy
Homeobox genes (2) /certified fixed orthodontic courses by Indian dental acad...Homeobox genes (2) /certified fixed orthodontic courses by Indian dental acad...
Homeobox genes (2) /certified fixed orthodontic courses by Indian dental acad...
Graph Processing with Titan and Scylla by Jason Plurad
Graph Processing with Titan and ScyllaGraph Processing with Titan and Scylla
Graph Processing with Titan and Scylla
Jason Plurad564 views
HBaseCon 2015: S2Graph - A Large-scale Graph Database with HBase by HBaseCon
HBaseCon 2015: S2Graph - A Large-scale Graph Database with HBaseHBaseCon 2015: S2Graph - A Large-scale Graph Database with HBase
HBaseCon 2015: S2Graph - A Large-scale Graph Database with HBase
HBaseCon8.8K views

Similar to Research, Education, and Cybersecurity Policies in India

People Like You Like Presentations Like This by
People Like You Like Presentations Like ThisPeople Like You Like Presentations Like This
People Like You Like Presentations Like ThisDavid Millard
386 views71 slides
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial) by
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Krishnaram Kenthapadi
2.7K views206 slides
BlueHat v18 || Securely handling data in marginalized communities by
BlueHat v18 || Securely handling data in marginalized communitiesBlueHat v18 || Securely handling data in marginalized communities
BlueHat v18 || Securely handling data in marginalized communitiesBlueHat Security Conference
457 views59 slides
Sample presentation by
Sample presentationSample presentation
Sample presentationNathaliaGuimares15
31 views18 slides
Essay About Research Project 1 by
Essay About Research Project 1Essay About Research Project 1
Essay About Research Project 1Anna Melek
5 views37 slides
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS by
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSEthics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSVik Moore
562 views44 slides

Similar to Research, Education, and Cybersecurity Policies in India (20)

People Like You Like Presentations Like This by David Millard
People Like You Like Presentations Like ThisPeople Like You Like Presentations Like This
People Like You Like Presentations Like This
David Millard386 views
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial) by Krishnaram Kenthapadi
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Essay About Research Project 1 by Anna Melek
Essay About Research Project 1Essay About Research Project 1
Essay About Research Project 1
Anna Melek5 views
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS by Vik Moore
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MSEthics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Ethics of Certified Peer Recovery Specialists-Presentation-Vik Moore, MS
Vik Moore562 views
Managing and publishing sensitive data in the social sciences - Webinar trans... by ARDC
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
ARDC608 views
Self-disclosure in twitter conversations - talk in QCRI by JinYeong Bak
Self-disclosure in twitter conversations - talk in QCRISelf-disclosure in twitter conversations - talk in QCRI
Self-disclosure in twitter conversations - talk in QCRI
JinYeong Bak963 views
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions by Bart Knijnenburg
Simplifying Privacy Decisions: Towards Interactive and Adaptive SolutionsSimplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions
Bart Knijnenburg1.8K views
06 Network Study Design: Ethical Considerations and Safeguards by dnac
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards
dnac425 views
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial) by Krishnaram Kenthapadi
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Krishnaram Kenthapadi11.9K views
Iwtc2008 Grainne Kirwan Internet Pyschology by IrishDev.com
Iwtc2008 Grainne Kirwan Internet PyschologyIwtc2008 Grainne Kirwan Internet Pyschology
Iwtc2008 Grainne Kirwan Internet Pyschology
IrishDev.com518 views
Internet Safety Lesson Plan 1 by Quennith
Internet Safety Lesson Plan 1Internet Safety Lesson Plan 1
Internet Safety Lesson Plan 1
Quennith643 views
Watching the workers: researching information behaviours in, and for, workplaces by Hazel Hall
Watching the workers: researching information behaviours in, and for, workplacesWatching the workers: researching information behaviours in, and for, workplaces
Watching the workers: researching information behaviours in, and for, workplaces
Hazel Hall2.7K views
Grounded, data with a story by InWithForward
Grounded, data with a storyGrounded, data with a story
Grounded, data with a story
InWithForward710 views
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse by Cybera Inc.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.425 views
Internet 1 lesson plan by Quennith
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
Quennith134 views

More from IIIT Hyderabad

Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias by
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
101 views56 slides
Identify, Inspect and Intervene Multimodal Fake News by
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
117 views120 slides
#ChatGPT #ResponsibleAI by
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAIIIIT Hyderabad
331 views21 slides
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety by
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
46 views38 slides
It is our choices, Harry, that show what we truly are, far more than our abil... by
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
86 views56 slides
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity by
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
57 views79 slides

More from IIIT Hyderabad (20)

Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias by IIIT Hyderabad
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad 101 views
Identify, Inspect and Intervene Multimodal Fake News by IIIT Hyderabad
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad 117 views
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety by IIIT Hyderabad
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad 46 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 86 views
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity by IIIT Hyderabad
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad 57 views
Data Science for Social Good: #LegalNLP #AlgorithmicBias... by IIIT Hyderabad
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad 21 views
How to Write a (Good) Research Paper by IIIT Hyderabad
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad 250 views
Data Science for Social Good: #LegalNLP #AlgorithmicBias by IIIT Hyderabad
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad 52 views
Social Computing Research in India by IIIT Hyderabad
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad 235 views
Modeling Online User Interactions and their Offline effects on Socio-Technica... by IIIT Hyderabad
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad 119 views
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay by IIIT Hyderabad
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad 54 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 56 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 389 views
Leveraging Social Media for Financial Advice by IIIT Hyderabad
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad 96 views
Development of Stress Induction and Detection System to Study its Effect on B... by IIIT Hyderabad
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad 107 views
A Framework for Automatic Question Answering in Indian Languages by IIIT Hyderabad
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad 191 views
A Framework For Automatic Question Answering in Indian Languages by IIIT Hyderabad
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
IIIT Hyderabad 26 views
Exposing, Examining and Intervening Fake News by IIIT Hyderabad
Exposing, Examining and Intervening Fake NewsExposing, Examining and Intervening Fake News
Exposing, Examining and Intervening Fake News
IIIT Hyderabad 98 views

Recently uploaded

Machine Element II Course outline.pdf by
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdfodatadese1
6 views2 slides
SWM L15-L28_drhasan (Part 2).pdf by
SWM L15-L28_drhasan (Part 2).pdfSWM L15-L28_drhasan (Part 2).pdf
SWM L15-L28_drhasan (Part 2).pdfMahmudHasan747870
28 views93 slides
7_DVD_Combinational_MOS_Logic_Circuits.pdf by
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdfUsha Mehta
50 views133 slides
Saikat Chakraborty Java Oracle Certificate.pdf by
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdfSaikatChakraborty787148
13 views1 slide
13_DVD_Latch-up_prevention.pdf by
13_DVD_Latch-up_prevention.pdf13_DVD_Latch-up_prevention.pdf
13_DVD_Latch-up_prevention.pdfUsha Mehta
9 views16 slides
Multi-objective distributed generation integration in radial distribution sy... by
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...IJECEIAES
15 views14 slides

Recently uploaded(20)

Machine Element II Course outline.pdf by odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese16 views
7_DVD_Combinational_MOS_Logic_Circuits.pdf by Usha Mehta
7_DVD_Combinational_MOS_Logic_Circuits.pdf7_DVD_Combinational_MOS_Logic_Circuits.pdf
7_DVD_Combinational_MOS_Logic_Circuits.pdf
Usha Mehta50 views
13_DVD_Latch-up_prevention.pdf by Usha Mehta
13_DVD_Latch-up_prevention.pdf13_DVD_Latch-up_prevention.pdf
13_DVD_Latch-up_prevention.pdf
Usha Mehta9 views
Multi-objective distributed generation integration in radial distribution sy... by IJECEIAES
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES15 views
CHI-SQUARE ( χ2) TESTS.pptx by ssusera597c5
CHI-SQUARE ( χ2) TESTS.pptxCHI-SQUARE ( χ2) TESTS.pptx
CHI-SQUARE ( χ2) TESTS.pptx
ssusera597c520 views
STUDY OF SMART MATERIALS USED IN CONSTRUCTION-1.pptx by AnnieRachelJohn
STUDY OF SMART MATERIALS USED IN CONSTRUCTION-1.pptxSTUDY OF SMART MATERIALS USED IN CONSTRUCTION-1.pptx
STUDY OF SMART MATERIALS USED IN CONSTRUCTION-1.pptx
AnnieRachelJohn25 views
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... by Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain10 views
NEW SUPPLIERS SUPPLIES (copie).pdf by georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou7 views
MSA Website Slideshow (16).pdf by msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla39 views
2_DVD_ASIC_Design_FLow.pdf by Usha Mehta
2_DVD_ASIC_Design_FLow.pdf2_DVD_ASIC_Design_FLow.pdf
2_DVD_ASIC_Design_FLow.pdf
Usha Mehta14 views
performance uploading.pptx by SanthiS10
performance uploading.pptxperformance uploading.pptx
performance uploading.pptx
SanthiS107 views

Research, Education, and Cybersecurity Policies in India

  • 1. Research,  Education,  and   Cybersecurity  Policies  in  India Cybersecurity  Governance:  A  Data-­‐Driven  Approach   Harvard  University   Oct  13,  2016 Ponnurangam  Kumaraguru  (“PK”) Associate  Professor Founding  Head,  CERC   fb/ponnurangam.kumaraguru,  @ponguru
  • 2. Who  am  I?   – Associate  Professor,  IIIT-­‐Delhi     – Ph.D.  from  School  of  Computer  Science,     Carnegie  Mellon  University  (CMU)     – Research  interests   -Cybersecuirty,  Social  Computing,  Computational   Social  Science,  Complex  Networks  pertaining  to   Human  Behavior,  specifically  in  the  context  of   Security  &  Privacy – Co-­‐ordinate  and  manage  Precog,   precog.iiitd.edu.in – ACM  Distinguished  Speaker   2
  • 4. 4 What  we  dabble  with!  
  • 9. OSN  for  Policing:  Boston   9
  • 10. OSN  for  Policing:  BLR   10
  • 11. OSN  for  Policing:  BLR   11
  • 12. 12
  • 13. 13
  • 14. 14
  • 16. Bridging  the  gap   – Officers   – Teachers   – Students   16
  • 18. 18
  • 19. Accounts  in  the  country!   19 http://precog.iiitd.edu.in/research/osm-­‐policing-­‐india/handles.html
  • 21. 21 20  Interviews 4  FGDs 10,427  Surveys #privacyindia12  Methodology 18  months!
  • 23. Demographics Gender  (N=  10,232) Male 67.57 Female 32.43 23 Age   (N=10,350) <18 1.54 18-­‐24 21.31 25-­‐29 32.20 30-­‐39 25.90 40-­‐49 14.09 50-­‐64 4.46 65+ 0.50 Age
  • 24. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   24 Q42,  N  =  6,855 It  is  not  a  concern  at  all   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   It  is  a  concern,  but  I  still  share  personal   information   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN  
  • 25. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   25 Q42,  N  =  6,855 It  is  not  a  concern  at  all   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   42.13   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   It  is  a  concern,  but  I  still  share  personal   information   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN  
  • 26. Internet  &  Social  Media What  do  you  feel  about  privacy  of  your  personal   information  on  your  OSN?   26 Q42,  N  =  6,855 It  is  not  a  concern  at  all   19.30   Since  I  have  specified  my  privacy  settings,  my   data  is  secure  from  a  privacy  breach   42.13   Even  though,  I  have  specified  my  privacy   settings,  I  am  concerned  about  privacy  of  my   data   23.84   It  is  a  concern,  but  I  still  share  personal   information   8.02   It  is  a  concern;  hence  I  do  not  share  personal   data  on  OSN   6.71  
  • 27. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   27 Q43,  N  =  6,929 Person  of  opposite  gender People  from  my  hometown Person  with  nice  profile  picture Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone
  • 28. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   28 Q43,  N  =  6,929 Person  of  opposite  gender People  from  my  hometown Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone
  • 29. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   29 Q43,  N  =  6,929 Person  of  opposite  gender 27.39 People  from  my  hometown Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with Anyone 2.99
  • 30. Internet  &  Social  Media If  you  receive  a  friendship  request  on  your  most   frequently  used  OSN,  which  of  the  following  people   will  you  add  as  friends?   30 Q43,  N  =  6,929 Person  of  opposite  gender 27.39 People  from  my  hometown 19.51 Person  with  nice  profile  picture 10.12 Strangers  (people  you  do  not   know) 4.99 Somebody,  whom  you  do  not   know  or  recognize  but  have   mutual  /  common  friends  with 8.31 Anyone 2.99
  • 31. Takeaways – Cybersecurity  is  a  complex  and  a  multi-­‐ faceted  area  /  problem   – Attempts  are  being  made  in  different   directions   – More  empirical  data  /  analysis  needed   – Long  way  to  go  for  India!   31