SlideShare a Scribd company logo
©2015CarnegieMellonUniversity:1
PrivacyGrade and
Social Cybersecurity
Jason Hong
Federal Trade Commission
July 9, 2015
Computer
Human
Interaction:
Mobility
Privacy
Security
©2015CarnegieMellonUniversity:2
Talk Overview
• PrivacyGrade
– Analyzing the privacy of 1M
smartphone apps
• Social Cybersecurity
– Using social psych to influence
people’s cybersecurity behaviors
©2015CarnegieMellonUniversity:3
What Are Your Apps Really Doing?
Shares your location,
gender, unique phone ID,
phone# with advertisers
Uploads your entire
contact list to their server
(including phone #s)
©2015CarnegieMellonUniversity:4
Many Smartphone Apps Have
“Unusual” Permissions
Location Data
Unique device ID
Location Data
Network Access
Unique device ID
Location Data
Microphone
Unique device ID
©2015CarnegieMellonUniversity:5
What Do Developers Know
about Privacy?
• Interviews with 13 app developers
• Surveys with 228 app developers
• What tools? Knowledge? Incentives?
• Points of leverage?
Balebako et al, The Privacy and Security Behaviors
of Smartphone App Developers. USEC 2014.
©2015CarnegieMellonUniversity:6
Summary of Findings
Third-party Libraries Problematic
• Use ads and analytics to monetize
©2015CarnegieMellonUniversity:7
Summary of Findings
Third-party Libraries Problematic
• Use ads and analytics to monetize
• Hard to understand their behaviors
– A few didn’t know they were using
libraries (inconsistent answers)
– Some didn’t know they collected data
– “If either Facebook or Flurry had a
privacy policy that was short and
concise and condensed into real
English rather than legalese, we
definitely would have read it.”
©2015CarnegieMellonUniversity:8
Summary of Findings
Devs Don’t Know What to Do
• Low awareness of existing privacy
guidelines
– Often just ask others around them
• Low perceived value of privacy
policies
– Mostly protection from lawsuits
– “I haven’t even read [our privacy
policy]. I mean, it’s just legal stuff
that’s required, so I just put in there.”
©2015CarnegieMellonUniversity:9
PrivacyGrade.org
• Improve transparency
• Assign privacy grades to
all 1M+ Android apps
©2015CarnegieMellonUniversity:10
©2015CarnegieMellonUniversity:11
©2015CarnegieMellonUniversity:12
©2015CarnegieMellonUniversity:13
©2015CarnegieMellonUniversity:14
Expectations vs Reality
©2015CarnegieMellonUniversity:15
Privacy as Expectations
Use crowdsourcing to compare what
people expect an app to do vs what
an app actually does
App Behavior
(What an app
actually does)
User Expectations
(What people think
the app does)
©2015CarnegieMellonUniversity:16
How PrivacyGrade Works
• Long tail distribution of libraries
• We focused on top 400 libraries
©2015CarnegieMellonUniversity:17
How PrivacyGrade Works
• We crowdsourced people’s
expectations of core set of 837 apps
– Ex. “How comfortable are you with
Drag Racing using your location for ads?”
• Created a model to predict people’s
likely privacy concerns
• Applied model to 1M Android apps
©2015CarnegieMellonUniversity:18
Overall Stats on PrivacyGrade
April 2015
• No sensitive permissions used
means A+
• Other grades
set at quartiles
of grade range
©2015CarnegieMellonUniversity:19
Changes in Grades Over Time
October 2014 to April 2015
©2015CarnegieMellonUniversity:20
Changes in Grades Over Time
Most Grades Remained the Same
©2015CarnegieMellonUniversity:21
Changes in Grades Over Time
A Fair Number of Apps Improved
©2015CarnegieMellonUniversity:22
Changes in Grades Over Time
Lots of Apps Deleted
• Not sure why deleted yet
– Some apps were re-uploaded
©2015CarnegieMellonUniversity:23
Impact of this Research
• Popular Press
– NYTimes, CNN, BBC, CBS, more
• Government
– Earlier work helped lead to FTC fines
– Scared some Congressional staffers
• Google
• Developers
©2015CarnegieMellonUniversity:24
Social Cybersecurity
• New work looking at changing
people’s awareness, knowledge,
and motivation to be secure
• Tool for FTC and companies to use
to improve privacy and security
©2015CarnegieMellonUniversity:25
Social Proof
©2015CarnegieMellonUniversity:26
• Baseline effectiveness is 35%
©2015CarnegieMellonUniversity:27
©2015CarnegieMellonUniversity:28
• “showing each user pictures of friends who
said they had already voted, generated
340,000 additional votes nationwide”
• “they also discovered that about 4 percent of
those who claimed they had voted were not
telling the truth”
©2015CarnegieMellonUniversity:29
Adoption of Cybersecurity
Features is Very Low
• Typically single digits
– Two-factor authentication
– Login notifications on Facebook
– Trusted contacts on Facebook
©2015CarnegieMellonUniversity:30
Insight from Interviews
Observability of Adoption Low
• One person stopped in coffee shop
and asked about the Android 9-dot:
“We were just sitting in a
coffee shop and I wanted
to show somebody
something and [they said], ‘
My phone does not have
that,’ and I was like, ‘I
believe it probably does.’”
©2015CarnegieMellonUniversity:31
Diffusion of Innovations
• Five major factors
for successful
innovations:
– Relative Advantage
– Trialability
– Complexity
– Compatibility
– Observability
©2015CarnegieMellonUniversity:32
Social Proof + Making
Cybersecurity Observable
• Variants
– Control
– Over # / %
– Only # / %
– Raw # / %
– Some
Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity
With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014.
©2015CarnegieMellonUniversity:33
Method
• Controlled, randomized study
with 50k active Facebook users
– 8 conditions, so N=6250
• Part of annual security awareness
campaign Facebook was going to
run anyway
©2015CarnegieMellonUniversity:34
Results of Experiment
©2015CarnegieMellonUniversity:35
Summary
• PrivacyGrade
– Analyzing the privacy of 1M apps
• Social Cybersecurity
– Social proof + observability to improve
cybersecurity behaviors
©2015CarnegieMellonUniversity:36
Thanks!
Collaborators:
Special thanks to:
• Army Research Office
• National Science Foundation
• Alfred P. Sloan Foundation
• Google
• CMU Cylab
• NQ Mobile
• Shah Amini
• Kevin Ku
• Jialiu Lin
• Song Luan
• Bharadwaj Ramachandran
• Norman Sadeh
©2015CarnegieMellonUniversity:37
How PrivacyGrade Works
©2015CarnegieMellonUniversity:38
Limitations of Current
Approach
• PrivacyGrade works for most apps
– But popular apps, lots of custom code
– Also can’t analyze backend
• Only free apps
– Limitations on downloading paid apps
• Assume most libraries have one
purpose
– True for vast majority
– More analytics + advertising combos
©2015CarnegieMellonUniversity:39
Talk Overview
• Interviews and surveys of app
developers
• PrivacyGrade.org
• Using text mining to infer
privacy-related app behaviors
• Reflections on privacy ecosystem
©2015CarnegieMellonUniversity:40
Reflections on Privacy
Consider entire ecosystem
• End-users
– Most research has focused here
– But puts too much burden
– Really hard to improve awareness,
knowledge, and motivation
©2015CarnegieMellonUniversity:41
Reflections on Privacy
Consider entire ecosystem
• End-users
• Developers
• Third-party developers
• Markets
• OS
• Third-party advocates
– Ex. FTC, Consumer Reports
©2015CarnegieMellonUniversity:42
Reflections on Privacy
Helping Developers
• Point of greatest leverage
• Examples:
– Better understanding of 3rd party libs
– Better design patterns for privacy
– Better APIs
• “Home” or “work” vs precise location
– Better reusable components
• Databases and ACID properties
• Make the path of least resistance
privacy sensitive
©2015CarnegieMellonUniversity:43
Mobile App
• Scans apps you
have on phone,
gets grades from
our site
• Just need to
add it to
Google Play store

More Related Content

What's hot

Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Jason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
Jason Hong
 
Comm 303 final project
Comm 303 final projectComm 303 final project
Comm 303 final project
Chris Miele
 
The Dawning Of The New Age
The Dawning Of The New AgeThe Dawning Of The New Age
The Dawning Of The New Age
hudsonpd
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Jason Hong
 
The Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are HeadingThe Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are Heading
Pew Research Center's Internet & American Life Project
 
Older adults and technology
Older adults and technologyOlder adults and technology
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
Forum One
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
Pew Research Center's Internet & American Life Project
 
Matching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross PromotionMatching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross Promotion
Gene Moo Lee
 
Networked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic LifeNetworked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic Life
Pew Research Center's Internet & American Life Project
 
KPCB Internet Trends 2013
KPCB Internet Trends 2013KPCB Internet Trends 2013
KPCB Internet Trends 2013
Diego Martone
 
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
Pew Research Center's Internet & American Life Project
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
Pew Research Center's Internet & American Life Project
 
Dating & Mating in the Digital Age
Dating & Mating in the Digital AgeDating & Mating in the Digital Age
Dating & Mating in the Digital Age
Pew Research Center's Internet & American Life Project
 
C R M Day 2 Online
C R M Day 2 OnlineC R M Day 2 Online
C R M Day 2 Onlineguestf468424
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexity
Entefy
 
Technology use by different income groups
Technology use by different income groupsTechnology use by different income groups
Technology use by different income groups
Pew Research Center's Internet & American Life Project
 

What's hot (20)

Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
Comm 303 final project
Comm 303 final projectComm 303 final project
Comm 303 final project
 
The Dawning Of The New Age
The Dawning Of The New AgeThe Dawning Of The New Age
The Dawning Of The New Age
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
The Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are HeadingThe Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are Heading
 
Older adults and technology
Older adults and technologyOlder adults and technology
Older adults and technology
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Technology Adoption by Lower Income Populations
Technology Adoption by Lower Income PopulationsTechnology Adoption by Lower Income Populations
Technology Adoption by Lower Income Populations
 
Matching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross PromotionMatching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross Promotion
 
New data on technology adoption by older adults
New data on technology adoption by older adultsNew data on technology adoption by older adults
New data on technology adoption by older adults
 
Networked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic LifeNetworked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic Life
 
KPCB Internet Trends 2013
KPCB Internet Trends 2013KPCB Internet Trends 2013
KPCB Internet Trends 2013
 
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Dating & Mating in the Digital Age
Dating & Mating in the Digital AgeDating & Mating in the Digital Age
Dating & Mating in the Digital Age
 
C R M Day 2 Online
C R M Day 2 OnlineC R M Day 2 Online
C R M Day 2 Online
 
Entefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexityEntefy's research report on information overload and digital complexity
Entefy's research report on information overload and digital complexity
 
Technology use by different income groups
Technology use by different income groupsTechnology use by different income groups
Technology use by different income groups
 

Similar to PrivacyGrade and Social Cybersecurity, talk at FTC July 2015

Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)
Chan Lee
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Jason Hong
 
Effectively aligning m-Government strategies to your organisational objective...
Effectively aligning m-Government strategies to your organisational objective...Effectively aligning m-Government strategies to your organisational objective...
Effectively aligning m-Government strategies to your organisational objective...
Reading Room
 
Mobile the new oxygen for events webinar
Mobile   the new oxygen for events webinarMobile   the new oxygen for events webinar
Mobile the new oxygen for events webinarCrowdCompass by Cvent
 
Presentation social mobile-watchdawgs
Presentation social mobile-watchdawgsPresentation social mobile-watchdawgs
Presentation social mobile-watchdawgsMeg Brown
 
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
DMI
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALPtaipida
 
Digital Research in Low-Resource Countries
Digital Research in Low-Resource CountriesDigital Research in Low-Resource Countries
Digital Research in Low-Resource Countries
Qualtrics
 
Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
Janet Jaiswal
 
Transforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
Transforming Web Business to a Mobile Business - Presentation by Sirish KosarajuTransforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
Transforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
RapidValue
 
Think tank event mobile app testing v1.3
Think tank event   mobile app testing v1.3Think tank event   mobile app testing v1.3
Think tank event mobile app testing v1.3
Samer Desouky
 
UNICEF Digital Strategy | Mobile Social Trends for 2015
UNICEF Digital Strategy | Mobile Social Trends for 2015UNICEF Digital Strategy | Mobile Social Trends for 2015
UNICEF Digital Strategy | Mobile Social Trends for 2015
Jim Rosenberg
 
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
MiquelEstape
 
Digital and Social Media Industry.
Digital and Social Media Industry.Digital and Social Media Industry.
Digital and Social Media Industry.
Sayantan Datta
 
Seizing the Mobile Moment
Seizing the Mobile MomentSeizing the Mobile Moment
Seizing the Mobile Moment
Rubicon Project
 
Intro To Mobile Analytics
Intro To Mobile AnalyticsIntro To Mobile Analytics
Intro To Mobile Analytics
Tapmint
 
Mobile strategy 2015
Mobile strategy 2015Mobile strategy 2015
Mobile strategy 2015
George Achillias
 

Similar to PrivacyGrade and Social Cybersecurity, talk at FTC July 2015 (20)

Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)Learning Experience Design (ATD 2016 ICE W316)
Learning Experience Design (ATD 2016 ICE W316)
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Effectively aligning m-Government strategies to your organisational objective...
Effectively aligning m-Government strategies to your organisational objective...Effectively aligning m-Government strategies to your organisational objective...
Effectively aligning m-Government strategies to your organisational objective...
 
Mobile the new oxygen for events webinar
Mobile   the new oxygen for events webinarMobile   the new oxygen for events webinar
Mobile the new oxygen for events webinar
 
Presentation social mobile-watchdawgs
Presentation social mobile-watchdawgsPresentation social mobile-watchdawgs
Presentation social mobile-watchdawgs
 
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALP
 
Digital Research in Low-Resource Countries
Digital Research in Low-Resource CountriesDigital Research in Low-Resource Countries
Digital Research in Low-Resource Countries
 
Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
 
Transforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
Transforming Web Business to a Mobile Business - Presentation by Sirish KosarajuTransforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
Transforming Web Business to a Mobile Business - Presentation by Sirish Kosaraju
 
Think tank event mobile app testing v1.3
Think tank event   mobile app testing v1.3Think tank event   mobile app testing v1.3
Think tank event mobile app testing v1.3
 
UNICEF Digital Strategy | Mobile Social Trends for 2015
UNICEF Digital Strategy | Mobile Social Trends for 2015UNICEF Digital Strategy | Mobile Social Trends for 2015
UNICEF Digital Strategy | Mobile Social Trends for 2015
 
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
2018.07.10 MyGov citizen centric service. Université de l'innovation publique...
 
Digital and Social Media Industry.
Digital and Social Media Industry.Digital and Social Media Industry.
Digital and Social Media Industry.
 
Seizing the Mobile Moment
Seizing the Mobile MomentSeizing the Mobile Moment
Seizing the Mobile Moment
 
Intro To Mobile Analytics
Intro To Mobile AnalyticsIntro To Mobile Analytics
Intro To Mobile Analytics
 
Mobile strategy 2015
Mobile strategy 2015Mobile strategy 2015
Mobile strategy 2015
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

PrivacyGrade and Social Cybersecurity, talk at FTC July 2015

Editor's Notes

  1. Lin et al, Expectation and Purpose: Understanding User’s Mental Models of Mobile App Privacy thru Crowdsourcing. Ubicomp 2012. http://www.cmuchimps.org/publications/expectation_and_purpose_understanding_users_mental_models_of_mobile_app_privacy_through_crowdsourcing_2012/pub_download
  2. Moto Racing / https://play.google.com/store/apps/details?id=com.motogames.supermoto
  3. http://www.cmuchimps.org/publications/the_privacy_and_security_behaviors_of_smartphone_app_developers_2014/pub_download
  4. On the left is Nissan Maxima gear shift. It turns out my brother was driving in 3rd gear for over a year before I pointed out to him that 3 and D are separate. The older Nissan Maxima gear shift on the right makes it hard to make this mistake.
  5. INTERNET, READ_PHONE_STATES, ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, CAMERA, GET_ACCOUNTS, SEND_SMS, READ_SMS, RECORD_AUDIO, BLUE_TOOTH and READ_CONTACT
  6. Lin et al, Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. SOUPS 2014. INTERNET, READ_PHONE_STATES, ACCESS_COARSE_LOCATION, ACCESS_FINE_LOCATION, CAMERA, GET_ACCOUNTS, SEND_SMS, READ_SMS, RECORD_AUDIO, BLUE_TOOTH and READ_CONTACT
  7. The draw of the crowd is devilishly strong There have been studies demonstrating that if you have lots of people looking up, pretty much every passerby will too
  8. http://www.carlsonschool.umn.edu/assets/118359.pdf Baseline environmental message was 35%
  9. Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. In The 21st ACM Conference on Computer and Communications Security (CCS 2014). 2014. [19.5% accept rate] http://www.cmuchimps.org/publications/increasing_security_sensitivity_with_social_proof_a_large_scale_experimental_confirmation_2014
  10. Results more subtle than presented in this table, see the CCS 2014 paper for details. The basics are there though, that social conditions worked better than control in almost every case
  11. DARPA Google CMU CyLab
  12. Big Data Crowd Scale Ecosystem -> developers / FTC