SlideShare a Scribd company logo
SocialCybersecurity.org Cori Faklaris | @heycori
Cori Faklaris, PhD researcher, Carnegie Mellon University
BEHAVIOR CHANGE
USING SOCIAL INFLUENCES
SocialCybersecurity.org Cori Faklaris | @heycori
Unintentional insider threat (UIT) can arise because security
tools or infrastructure does not account for social needs.
Social influences can be used to motivate security behaviors.
Join forces with us! We are looking for external collaborators.
MAJOR TAKEAWAYS
2
SocialCybersecurity.org Cori Faklaris | @heycori
“THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY
JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS
Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.
In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
SocialCybersecurity.org Cori Faklaris | @heycori
THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
SocialCybersecurity.org Cori Faklaris | @heycori
SA-6 MEASURES SECURITY ATTITUDE
• Generally, I diligently follow a routine about security practices.
• I always pay attention to experts’ advice about the steps I need to take to keep my
online data and accounts safe.
• I am extremely knowledgeable about all the steps needed to keep my online data and
accounts safe.
• I am extremely motivated to take all the steps needed to keep my online data and
accounts safe.
• I often am interested in articles about security threats.
• I seek out opportunities to learn about security measures that are relevant to me.
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
5
SocialCybersecurity.org Cori Faklaris | @heycori
• Workplace cybersecurity: Sharing
accounts and devices to collaborate on
tasks and to keep costs down.
• Workarounds are norm (ex: password taped to PC)
• Difficult to share and to control access with systems
that presume one user at a time
• Lack of accountability and awareness of one
person’s activities by others
SOCIAL CONTEXTS ARE INFLUENCE
6
Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In
Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at:
https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
SocialCybersecurity.org Cori Faklaris | @heycori
• Reciprocity: People are
driven to repay acts in kind
and to share resources in
a network of obligation
• Liking: People pay
attention to the opinions of
those they admire or who
are similar to themselves
‘WEAPONS OF INFLUENCE’
7
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
• Authority: People tend to
follow the guidance of
others presented as
authority figures or experts
• Social Proof: People look
to those around them for
guidance on how they
should behave
‘WEAPONS OF INFLUENCE’
8
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
SAFESEA BROWSER
PLUGIN FOR
GOOGLE CHROME
9
Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and
Laura Dabbish. 2019. Safesea: A Chrome Plugin to
Crowdsource Privacy Settings. Poster presentation for CMU
Privacy Day at Carnegie Mellon University, Feb. 1, 2019.
Available at: http://cups.cs.cmu.edu/privacy-
day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf
• Helps Facebook users navigate
privacy and security settings.
• Displays crowd and expert
suggestions for settings.
SocialCybersecurity.org Cori Faklaris | @heycori
• Pay people or give them
freebies to share
cybersecurity memes with
your website URL on their
social media accounts
• Use SA-6 along with
system stats and social
media metrics to measure
effectiveness
FREE RESEARCH IDEA
Image source:
https://www.pin
terest.com/The
SACompany/th
e-security-
awareness-
company/
10
SocialCybersecurity.org Cori Faklaris | @heycori
• Create a cybersecurity
social event such as a
game night, a movie night
or a scavenger hunt
• Use SA-6 along with other
scales/survey items to test
whether participants’
attitudes, intentions or
reported behaviors improve
FREE RESEARCH IDEA
Image source:
https://www.amazon.com/ThinkF
un-Hacker-Cybersecurity-Coding-
Girls/dp/B07FXYJ5BC
11
SocialCybersecurity.org Cori Faklaris | @heycori
 Unintentional insider threat (UIT) can
arise because security tools or
infrastructure does not account for
social needs.
 Social influences can be used to
motivate security behaviors.
 Join forces with us! We are looking
for external collaborators.
TWITTER: @heycori
EMAIL: heycori [at] cmu.edu
MAJOR TAKEAWAYS
12

More Related Content

What's hot

Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
Pew Research Center's Internet & American Life Project
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
anilramnanan
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
Ansgar Koene
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyNicolette Reyhani
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17
Ansgar Koene
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
Noori Sadeq
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
Jeffrey Hunt
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
guestc9f21b
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it is
Axway
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
kelseybee316
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
YogeshIJTSRD
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
computer ethics
computer ethicscomputer ethics
computer ethics
Saurabh Singh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
Matthew Lease
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
Ansgar Koene
 

What's hot (20)

Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it is
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 

Similar to Behavior Change Using Social Influences

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
University of North Carolina at Charlotte
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Jessica Vitak
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
citasa
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook ingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
daynamckernon
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to Know
Lucinda Rush
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
daynamckernon
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
rosiecabaniss
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
Michael Zimmer
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open Data
Open Institute
 
Apple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement CooperationApple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement Cooperation
ardiansyahmaulana11
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
ICT Watch - Indonesia
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
Junie Kwon
 

Similar to Behavior Change Using Social Influences (20)

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to Know
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open Data
 
Apple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement CooperationApple and the FBI: User Privacy and Law Enforcement Cooperation
Apple and the FBI: User Privacy and Law Enforcement Cooperation
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 

More from University of North Carolina at Charlotte

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
University of North Carolina at Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
University of North Carolina at Charlotte
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
University of North Carolina at Charlotte
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
University of North Carolina at Charlotte
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
University of North Carolina at Charlotte
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
University of North Carolina at Charlotte
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
University of North Carolina at Charlotte
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
University of North Carolina at Charlotte
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
University of North Carolina at Charlotte
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
University of North Carolina at Charlotte
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
University of North Carolina at Charlotte
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
University of North Carolina at Charlotte
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
University of North Carolina at Charlotte
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
University of North Carolina at Charlotte
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
University of North Carolina at Charlotte
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
University of North Carolina at Charlotte
 

More from University of North Carolina at Charlotte (16)

A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
 
Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Behavior Change Using Social Influences

  • 1. SocialCybersecurity.org Cori Faklaris | @heycori Cori Faklaris, PhD researcher, Carnegie Mellon University BEHAVIOR CHANGE USING SOCIAL INFLUENCES
  • 2. SocialCybersecurity.org Cori Faklaris | @heycori Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. Social influences can be used to motivate security behaviors. Join forces with us! We are looking for external collaborators. MAJOR TAKEAWAYS 2
  • 3. SocialCybersecurity.org Cori Faklaris | @heycori “THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
  • 4. SocialCybersecurity.org Cori Faklaris | @heycori THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
  • 5. SocialCybersecurity.org Cori Faklaris | @heycori SA-6 MEASURES SECURITY ATTITUDE • Generally, I diligently follow a routine about security practices. • I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. • I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. • I am extremely motivated to take all the steps needed to keep my online data and accounts safe. • I often am interested in articles about security threats. • I seek out opportunities to learn about security measures that are relevant to me. Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: 5
  • 6. SocialCybersecurity.org Cori Faklaris | @heycori • Workplace cybersecurity: Sharing accounts and devices to collaborate on tasks and to keep costs down. • Workarounds are norm (ex: password taped to PC) • Difficult to share and to control access with systems that presume one user at a time • Lack of accountability and awareness of one person’s activities by others SOCIAL CONTEXTS ARE INFLUENCE 6 Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at: https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
  • 7. SocialCybersecurity.org Cori Faklaris | @heycori • Reciprocity: People are driven to repay acts in kind and to share resources in a network of obligation • Liking: People pay attention to the opinions of those they admire or who are similar to themselves ‘WEAPONS OF INFLUENCE’ 7 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 8. SocialCybersecurity.org Cori Faklaris | @heycori • Authority: People tend to follow the guidance of others presented as authority figures or experts • Social Proof: People look to those around them for guidance on how they should behave ‘WEAPONS OF INFLUENCE’ 8 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 9. SocialCybersecurity.org Cori Faklaris | @heycori SAFESEA BROWSER PLUGIN FOR GOOGLE CHROME 9 Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and Laura Dabbish. 2019. Safesea: A Chrome Plugin to Crowdsource Privacy Settings. Poster presentation for CMU Privacy Day at Carnegie Mellon University, Feb. 1, 2019. Available at: http://cups.cs.cmu.edu/privacy- day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf • Helps Facebook users navigate privacy and security settings. • Displays crowd and expert suggestions for settings.
  • 10. SocialCybersecurity.org Cori Faklaris | @heycori • Pay people or give them freebies to share cybersecurity memes with your website URL on their social media accounts • Use SA-6 along with system stats and social media metrics to measure effectiveness FREE RESEARCH IDEA Image source: https://www.pin terest.com/The SACompany/th e-security- awareness- company/ 10
  • 11. SocialCybersecurity.org Cori Faklaris | @heycori • Create a cybersecurity social event such as a game night, a movie night or a scavenger hunt • Use SA-6 along with other scales/survey items to test whether participants’ attitudes, intentions or reported behaviors improve FREE RESEARCH IDEA Image source: https://www.amazon.com/ThinkF un-Hacker-Cybersecurity-Coding- Girls/dp/B07FXYJ5BC 11
  • 12. SocialCybersecurity.org Cori Faklaris | @heycori  Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.  Social influences can be used to motivate security behaviors.  Join forces with us! We are looking for external collaborators. TWITTER: @heycori EMAIL: heycori [at] cmu.edu MAJOR TAKEAWAYS 12