SlideShare a Scribd company logo
#RSAC
Bikash BaraiUsing Behavioral Psychology and
Science of Habit to Change User
Behavior
Co-founder (Cigital India)
@bikashbarai1
#RSAC
Is Awareness Enough To Change
Human Behavior?
2
#RSAC
3
Credit: Abd Allah Foteih
#RSAC
Awareness vs Change Of Behavior
4
Example: Continued security training beyond the baseline are unlikely to be effective -
“Modifying Smartphone User Locking Behavior” – by Dirk et al (ACM – 2013)
Awareness
ChangeinBehavior
#RSAC
What Else Do We Need?
5
#RSAC
The Mystery of Eugene Pauly’s Brain ..
6
Dr. Lary R. Squire
University of California, San Diego
Image Source: http://whoville.ucsd.edu/about.html
#RSAC
Goal Directed System (Pre-Frontal Cortex)
Responsible for new or infrequent
behaviors
Guided by attitudes, goals, values,
knowledge
Conscious and deliberate
Slow
Habit System (Basal Ganglia)
Very fast. Does not require thought or
attention
Less conscious. More automatic
Goal Directed and Habit System
7
Credit: Neal et al – The Science of Habit…
#RSAC
40% of our daily actions are driven without thinking
Examples of Habits in action
Changing gears
Getting out of elevator in wrong floor
Tying Shoe knots
Bad habits in action
Checking phone/blackberry during the middle of sleep
Clicking phishing links
Writing down passwords in open
Habits in Action..
8
#RSAC
How To Build A New Habit?
9
#RSAC
Story of Pepsodent ..
10
https://upload.wikimedia.org/wikipedia/en/8/88/Pepsodent-0179c.jpg
#RSAC
Trigger – Routine – Reward ( & Craving )
11
Trigger:
Feel Tooth Film with
tongue
Routine:
Brushing Teeth
Reward:
Great Smile
Crave for
Tingling
Image Credit: Seth LemmonsImage Credit: Wikipediahttps://i.ytimg.com/vi/rf1Bs2XpwFI/maxresdefault.jpg
#RSAC
Step 1: Find a Predictable and Recurring Trigger
Step 2: Devise the new Routine/Habit
Step 3: Find the Reward
Practice, Practice, Practice without exceptions
Steps for Building New Habits
12
#RSAC
How To Change A Habit?
13
#RSAC
14
Old Habits
Never Die
#RSAC
Example – Changing A Habit
15
Trigger:
Boredom
Routine:
Have a Whisky
Reward:
Feel Happy
Image Credit: Wiki
#RSAC
Example – Changing A Habit
16
Trigger:
Boredom
New Routine:
Talk to a friend
Reward:
Feel Happy
Image Credit: Wiki
#RSAC
3 Steps for Changing Old Habits
Identify and Deconstruct the Habit
Find the Trigger
Find the “real hidden reward” – Experiment to discover
Find the Trigger-Routine-Reward-Craving model
Find an alternative routine to satisfy the “real hidden reward”
Practice. Practice. Practice.
#RSAC
“Hard Thing” about “Easy Things”..
18
#RSAC
Understanding Buffer Overflow - Easy
19
Finding A vulnerability - Hard
Writing A “Reliable” Exploit- Very Hard
#RSAC
Several “toothpaste” companies went bankrupt
Coke, McDonalds campaigns..
What is hard about it?
Finding a “Reliable” trigger and reward
Creating craving and making it stick
Hard or Easy?
20
#RSAC
Applying The Science Of Habit
21
In Information Security & Life..
#RSAC
Example 1: Create Habit of Locking Computer
Screen..
Goal: Locking system while leaving desk
Trigger – Getting up from chair/Leaving the system
Routine – Lock your computer
Reward – Feeling of security
Rehearse or Repeat at least 20 times
If you forget then go back to seat and repeat the routine
#RSAC
Example 2 – Change the Habit of Writing Down
Password in Open Areas
Goal: Stop the habit of writing down password areas
Trigger – New password setting request
Old Routine – write down the password
New Routine – “write down the clue” or “Use a Scheme to generate new
passwords”
Reward – Feeling of security
Rehearse or Repeat
#RSAC
Example 3: Preventing Phishing
Old Habit
Trigger: Legitimate entity asks for personal details
Routine: Share the details
New Desired Habit
Trigger: Legitimate entity asks for personal details
New Routine: Validate the legitimacy of the entity
Practice. Practice. Practice
24
#RSAC
Example 4- Create Secure Coding Behavior
Goal – Ensuring coders use secure coding functions
Trigger – Typing a function
Old Routine – Type insecure function
New Routine – Use intervention method to prompt secure function
Enough practice
Automatic use of secure function
#RSAC
Habits in Day to Day Life..
Playing/Exercise everyday
Controlling anger outbursts..
#RSAC
Current State of Research
27
#RSAC
Research on Habits and Beyond..
Research on Habits
Significant studies in the field of psychology, marketing, sports etc
Little or No research in areas related to IT security
28
#RSAC
References and Other Studies ..
Balleine et al – Goal directed instrumental action: contingency and incentive learning and their cortical
substrates
Kahneman – Thinking fast and slow
Duhigg- The power of habit
Neal et al – The pull of the past when do habits persist despite conflict with motives?
Rothman et al- Reflective and automotive processes in the initiation and maintenance of dietary change
Sheeran et al – Implementation intentions and repeated behavior..
Wood et al – A new look at habits and habit- goal interface
Wood et al- The habitual consumer
Wood et al- Habits in everyday life: thought emotion and action
29
#RSAC
Apply What You Learned..
30
#RSAC
Apply What You Learned
Next Week
Choose 1 habit that you want to change or build
Identify a small group for experiment
Experiment
First 3 months
Find the most important habits to change in your organization
Create an organization wide plan for habit change drills
Make people practice at least 20 to 30 times in a short time frame. (Group
activities, Simulation exercise, Wargames etc)
Measure the success of the program
#RSAC
After 6 months
Assess the success of the program based on the metrics defined
Reassess the risky and secure behavior and create a new program
32
#RSAC
Awareness Is Not Enough
33
Invest In Forming Lasting Habits
#RSAC
Practice Does Not Make Perfect
34
“Perfect Practice” Makes Perfect
#RSAC
Want To Engineer A Habit?
35
Let’s Meet At The Bar ..
#RSAC
Questions please..
bbarai@cigital.com
@bikashbarai1
36
Bikash Barai

More Related Content

Viewers also liked

Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
Priyanka Aash
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
Priyanka Aash
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
Priyanka Aash
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
Priyanka Aash
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Priyanka Aash
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sector
Phu H. Nguyen
 
Workshop on Endpoint Memory Forensics
Workshop on Endpoint Memory ForensicsWorkshop on Endpoint Memory Forensics
Workshop on Endpoint Memory Forensics
Priyanka Aash
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
Priyanka Aash
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)
vanisre jaiswal
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
Priyanka Aash
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data Driven Innovation
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Priyanka Aash
 
7 Myths of AI
7 Myths of AI7 Myths of AI
7 Myths of AI
CrowdFlower
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Priyanka Aash
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015
Patrick Kalaher
 
Senzations’15: Secure Internet of Things
Senzations’15: Secure Internet of ThingsSenzations’15: Secure Internet of Things
Senzations’15: Secure Internet of Things
SenZations Summer School
 
(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1
Serhii Havrylov
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD Introduction
Wayne Sun
 

Viewers also liked (20)

Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sector
 
Workshop on Endpoint Memory Forensics
Workshop on Endpoint Memory ForensicsWorkshop on Endpoint Memory Forensics
Workshop on Endpoint Memory Forensics
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
7 Myths of AI
7 Myths of AI7 Myths of AI
7 Myths of AI
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015
 
Senzations’15: Secure Internet of Things
Senzations’15: Secure Internet of ThingsSenzations’15: Secure Internet of Things
Senzations’15: Secure Internet of Things
 
(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD Introduction
 

Similar to Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior

Using Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User BehaviorUsing Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User Behavior
Priyanka Aash
 
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback VerbicQualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Northpoint Centre of Learning
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
NUS-ISS
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
DrThenmozhiSPESUMCA
 
Ch14
Ch14Ch14
Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011
uchitha bandara
 
Baworld adapting to whats happening
Baworld adapting to whats happeningBaworld adapting to whats happening
Baworld adapting to whats happening
Dave Davis PMP, PgMP, PBA
 
Add creativity to your decision process
Add creativity to your decision processAdd creativity to your decision process
Add creativity to your decision process
Siddharth Kumar Kadamb
 
APF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 finalAPF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 final
Mike Courtney
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Mike Cardus
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine Windows
Mike Cardus
 
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision FiltersKanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
LeanKanbanIndia
 
How to build a superstar self-organizing team?
How to build a superstar self-organizing team?How to build a superstar self-organizing team?
How to build a superstar self-organizing team?
Oleksandr Lutsaievskyi
 
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and DesignPRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
Purple, Rock, Scissors
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...
Angus Carbarns
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data Practices
Atif Shaikh
 
Hilda taba’s inductive thinking model
Hilda taba’s inductive thinking modelHilda taba’s inductive thinking model
Hilda taba’s inductive thinking model
sudha pandeya/pathak
 
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Hassan Usman
 
Shaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - IntroductionShaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - Introduction
Kerry Richardson
 
Creativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming CompetenciesCreativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming Competencies
Herrmann International
 

Similar to Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior (20)

Using Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User BehaviorUsing Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User Behavior
 
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback VerbicQualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Ch14
Ch14Ch14
Ch14
 
Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011
 
Baworld adapting to whats happening
Baworld adapting to whats happeningBaworld adapting to whats happening
Baworld adapting to whats happening
 
Add creativity to your decision process
Add creativity to your decision processAdd creativity to your decision process
Add creativity to your decision process
 
APF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 finalAPF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 final
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First Event
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine Windows
 
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision FiltersKanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
 
How to build a superstar self-organizing team?
How to build a superstar self-organizing team?How to build a superstar self-organizing team?
How to build a superstar self-organizing team?
 
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and DesignPRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data Practices
 
Hilda taba’s inductive thinking model
Hilda taba’s inductive thinking modelHilda taba’s inductive thinking model
Hilda taba’s inductive thinking model
 
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
 
Shaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - IntroductionShaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - Introduction
 
Creativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming CompetenciesCreativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming Competencies
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior

  • 1. #RSAC Bikash BaraiUsing Behavioral Psychology and Science of Habit to Change User Behavior Co-founder (Cigital India) @bikashbarai1
  • 2. #RSAC Is Awareness Enough To Change Human Behavior? 2
  • 4. #RSAC Awareness vs Change Of Behavior 4 Example: Continued security training beyond the baseline are unlikely to be effective - “Modifying Smartphone User Locking Behavior” – by Dirk et al (ACM – 2013) Awareness ChangeinBehavior
  • 5. #RSAC What Else Do We Need? 5
  • 6. #RSAC The Mystery of Eugene Pauly’s Brain .. 6 Dr. Lary R. Squire University of California, San Diego Image Source: http://whoville.ucsd.edu/about.html
  • 7. #RSAC Goal Directed System (Pre-Frontal Cortex) Responsible for new or infrequent behaviors Guided by attitudes, goals, values, knowledge Conscious and deliberate Slow Habit System (Basal Ganglia) Very fast. Does not require thought or attention Less conscious. More automatic Goal Directed and Habit System 7 Credit: Neal et al – The Science of Habit…
  • 8. #RSAC 40% of our daily actions are driven without thinking Examples of Habits in action Changing gears Getting out of elevator in wrong floor Tying Shoe knots Bad habits in action Checking phone/blackberry during the middle of sleep Clicking phishing links Writing down passwords in open Habits in Action.. 8
  • 9. #RSAC How To Build A New Habit? 9
  • 10. #RSAC Story of Pepsodent .. 10 https://upload.wikimedia.org/wikipedia/en/8/88/Pepsodent-0179c.jpg
  • 11. #RSAC Trigger – Routine – Reward ( & Craving ) 11 Trigger: Feel Tooth Film with tongue Routine: Brushing Teeth Reward: Great Smile Crave for Tingling Image Credit: Seth LemmonsImage Credit: Wikipediahttps://i.ytimg.com/vi/rf1Bs2XpwFI/maxresdefault.jpg
  • 12. #RSAC Step 1: Find a Predictable and Recurring Trigger Step 2: Devise the new Routine/Habit Step 3: Find the Reward Practice, Practice, Practice without exceptions Steps for Building New Habits 12
  • 13. #RSAC How To Change A Habit? 13
  • 15. #RSAC Example – Changing A Habit 15 Trigger: Boredom Routine: Have a Whisky Reward: Feel Happy Image Credit: Wiki
  • 16. #RSAC Example – Changing A Habit 16 Trigger: Boredom New Routine: Talk to a friend Reward: Feel Happy Image Credit: Wiki
  • 17. #RSAC 3 Steps for Changing Old Habits Identify and Deconstruct the Habit Find the Trigger Find the “real hidden reward” – Experiment to discover Find the Trigger-Routine-Reward-Craving model Find an alternative routine to satisfy the “real hidden reward” Practice. Practice. Practice.
  • 18. #RSAC “Hard Thing” about “Easy Things”.. 18
  • 19. #RSAC Understanding Buffer Overflow - Easy 19 Finding A vulnerability - Hard Writing A “Reliable” Exploit- Very Hard
  • 20. #RSAC Several “toothpaste” companies went bankrupt Coke, McDonalds campaigns.. What is hard about it? Finding a “Reliable” trigger and reward Creating craving and making it stick Hard or Easy? 20
  • 21. #RSAC Applying The Science Of Habit 21 In Information Security & Life..
  • 22. #RSAC Example 1: Create Habit of Locking Computer Screen.. Goal: Locking system while leaving desk Trigger – Getting up from chair/Leaving the system Routine – Lock your computer Reward – Feeling of security Rehearse or Repeat at least 20 times If you forget then go back to seat and repeat the routine
  • 23. #RSAC Example 2 – Change the Habit of Writing Down Password in Open Areas Goal: Stop the habit of writing down password areas Trigger – New password setting request Old Routine – write down the password New Routine – “write down the clue” or “Use a Scheme to generate new passwords” Reward – Feeling of security Rehearse or Repeat
  • 24. #RSAC Example 3: Preventing Phishing Old Habit Trigger: Legitimate entity asks for personal details Routine: Share the details New Desired Habit Trigger: Legitimate entity asks for personal details New Routine: Validate the legitimacy of the entity Practice. Practice. Practice 24
  • 25. #RSAC Example 4- Create Secure Coding Behavior Goal – Ensuring coders use secure coding functions Trigger – Typing a function Old Routine – Type insecure function New Routine – Use intervention method to prompt secure function Enough practice Automatic use of secure function
  • 26. #RSAC Habits in Day to Day Life.. Playing/Exercise everyday Controlling anger outbursts..
  • 27. #RSAC Current State of Research 27
  • 28. #RSAC Research on Habits and Beyond.. Research on Habits Significant studies in the field of psychology, marketing, sports etc Little or No research in areas related to IT security 28
  • 29. #RSAC References and Other Studies .. Balleine et al – Goal directed instrumental action: contingency and incentive learning and their cortical substrates Kahneman – Thinking fast and slow Duhigg- The power of habit Neal et al – The pull of the past when do habits persist despite conflict with motives? Rothman et al- Reflective and automotive processes in the initiation and maintenance of dietary change Sheeran et al – Implementation intentions and repeated behavior.. Wood et al – A new look at habits and habit- goal interface Wood et al- The habitual consumer Wood et al- Habits in everyday life: thought emotion and action 29
  • 30. #RSAC Apply What You Learned.. 30
  • 31. #RSAC Apply What You Learned Next Week Choose 1 habit that you want to change or build Identify a small group for experiment Experiment First 3 months Find the most important habits to change in your organization Create an organization wide plan for habit change drills Make people practice at least 20 to 30 times in a short time frame. (Group activities, Simulation exercise, Wargames etc) Measure the success of the program
  • 32. #RSAC After 6 months Assess the success of the program based on the metrics defined Reassess the risky and secure behavior and create a new program 32
  • 33. #RSAC Awareness Is Not Enough 33 Invest In Forming Lasting Habits
  • 34. #RSAC Practice Does Not Make Perfect 34 “Perfect Practice” Makes Perfect
  • 35. #RSAC Want To Engineer A Habit? 35 Let’s Meet At The Bar ..

Editor's Notes

  1. Eugene Pauly’s part of the brain is destroyed due to viral encephalitis and left him with no short term memory. He moved to a new neighborhood and his wife used to take her for a walk everyday at a fixed time. Amazingly one day when his wife was late he went out for walk himself and returned back though he did not remember the way. He could not tell where the refrigerator was located if asked but if hungry he could automatically go there and take out a jar or nuts. The scientists were baffled how could somebody reach the refrigerator or traverse a path automatically without rememberring it’s whereabouts.
  2. In early 1900 only 7% of the American were brushing teeth. Most of the toothpaste companies failed to market the toothpaste despite poor dental hygiene of the entire country. Claude Hopkins (creator of quaker oat, goodyear tires campaign.. Made so much money.. That he devotred..) formula – quaker oats works only if you have one bowl every morning.. Drink a tonic at the first symptom of fatigue created a clever campaign which revolutionized the brush habits in America and moved it to 65%. How it worked? He used Habit Cycle – He found that there is a film which deposits on teeth. It occurs no matter how often you brush. But he cleverly used this as a Cue and created the above campaign to drive the brushing habit as a trigger. He used great smile and good hygiene as the reward.
  3. However, after a while scientists later discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same. Similar strategy has been used in marketing Febreze and multiple other products. Craving creates urge to get the reward. It helps a habit to stick.. Urge for nicotin, urge for the fatty food, urge for the smell, urge for feeling fresh/craving for endorphin rush after exercise
  4. However, after a while scientists discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same.
  5. However, after a while scientists discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same.
  6. Will recreate the graphics to make it clear
  7. Will improve upon the look and feel of this slide