SlideShare a Scribd company logo
1 of 2
©2015CarnegieMellonUniversity:1
Social Cybersecurity
• Overly focused on new mechanisms
• How can we get people to use what’s
already out there?
– Awareness, Knowledge, Motivation
• Social influences subtle but potent
– “80% of your neighbors save power”
– “Last person in room reused towel”
– Facebook study about voting
©2015CarnegieMellonUniversity:2
Social Cybersecurity
• Through interviews, half of security
changes related to social [SOUPS 2014]
•
[CCS 2014]
• How to make security more observable?
• Can we make security “us” vs “me”?
• How does security diffuse? [CSCW 2015]

More Related Content

What's hot

Ipp2014
Ipp2014Ipp2014
Ipp2014osimod
 
Global Reach Local Scale
Global Reach Local ScaleGlobal Reach Local Scale
Global Reach Local Scalehudsonpd
 
Greate Mobile Debate
Greate Mobile DebateGreate Mobile Debate
Greate Mobile Debatepanall2009
 
Jjansen networked consumer_2011
Jjansen networked consumer_2011Jjansen networked consumer_2011
Jjansen networked consumer_2011Jim Jansen
 
Lew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceLew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceBlackash Bushfire Consulting
 
Project Info Sheet
Project Info SheetProject Info Sheet
Project Info SheetMayci Neal
 
Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303jordonp
 
Technology Adoption
Technology AdoptionTechnology Adoption
Technology Adoptionjenhuss
 
Sociology, Impact of Technology on society
Sociology, Impact of Technology on societySociology, Impact of Technology on society
Sociology, Impact of Technology on societyMd. Ismail Hossen
 
Faster is different by Zeynem Tufekci
Faster is different  by Zeynem TufekciFaster is different  by Zeynem Tufekci
Faster is different by Zeynem TufekciDaniel Verhoeven
 
Web and Emerging Technology in Health Promotion
Web and Emerging Technology in Health PromotionWeb and Emerging Technology in Health Promotion
Web and Emerging Technology in Health PromotionNaomi Hirsch
 
The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)oiisdp2010
 
Community Life Competence -EN
Community Life Competence -ENCommunity Life Competence -EN
Community Life Competence -ENgastonschmitz
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
El consumidor de video online - Generación Video
El consumidor de video online - Generación VideoEl consumidor de video online - Generación Video
El consumidor de video online - Generación VideoGiancarlo Giansante
 
The future of remote teams: how to fine-tune virtual collaboration?
The future of remote teams: how to fine-tune virtual collaboration?The future of remote teams: how to fine-tune virtual collaboration?
The future of remote teams: how to fine-tune virtual collaboration?Wrike
 
LEP Exhibition – Awareness Survey
LEP Exhibition – Awareness SurveyLEP Exhibition – Awareness Survey
LEP Exhibition – Awareness SurveyMosman Council
 
How To Meet Open Gov Collaboration
How To Meet Open Gov CollaborationHow To Meet Open Gov Collaboration
How To Meet Open Gov CollaborationGovLoop
 
From hotline to online handout
From hotline to online handoutFrom hotline to online handout
From hotline to online handoutvanden34
 

What's hot (20)

Ipp2014
Ipp2014Ipp2014
Ipp2014
 
Global Reach Local Scale
Global Reach Local ScaleGlobal Reach Local Scale
Global Reach Local Scale
 
Greate Mobile Debate
Greate Mobile DebateGreate Mobile Debate
Greate Mobile Debate
 
Are consumers really networked? And, if they are, should you care?
Are consumers really networked? And, if they are, should you care?Are consumers really networked? And, if they are, should you care?
Are consumers really networked? And, if they are, should you care?
 
Jjansen networked consumer_2011
Jjansen networked consumer_2011Jjansen networked consumer_2011
Jjansen networked consumer_2011
 
Lew Short emergency response & recovery conference
Lew Short emergency response & recovery conferenceLew Short emergency response & recovery conference
Lew Short emergency response & recovery conference
 
Project Info Sheet
Project Info SheetProject Info Sheet
Project Info Sheet
 
Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303
 
Technology Adoption
Technology AdoptionTechnology Adoption
Technology Adoption
 
Sociology, Impact of Technology on society
Sociology, Impact of Technology on societySociology, Impact of Technology on society
Sociology, Impact of Technology on society
 
Faster is different by Zeynem Tufekci
Faster is different  by Zeynem TufekciFaster is different  by Zeynem Tufekci
Faster is different by Zeynem Tufekci
 
Web and Emerging Technology in Health Promotion
Web and Emerging Technology in Health PromotionWeb and Emerging Technology in Health Promotion
Web and Emerging Technology in Health Promotion
 
The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)
 
Community Life Competence -EN
Community Life Competence -ENCommunity Life Competence -EN
Community Life Competence -EN
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
El consumidor de video online - Generación Video
El consumidor de video online - Generación VideoEl consumidor de video online - Generación Video
El consumidor de video online - Generación Video
 
The future of remote teams: how to fine-tune virtual collaboration?
The future of remote teams: how to fine-tune virtual collaboration?The future of remote teams: how to fine-tune virtual collaboration?
The future of remote teams: how to fine-tune virtual collaboration?
 
LEP Exhibition – Awareness Survey
LEP Exhibition – Awareness SurveyLEP Exhibition – Awareness Survey
LEP Exhibition – Awareness Survey
 
How To Meet Open Gov Collaboration
How To Meet Open Gov CollaborationHow To Meet Open Gov Collaboration
How To Meet Open Gov Collaboration
 
From hotline to online handout
From hotline to online handoutFrom hotline to online handout
From hotline to online handout
 

Viewers also liked

Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015Jason Hong
 
Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
Using Text Mining to Infer the Purpose of Permission Use in Mobile AppsUsing Text Mining to Infer the Purpose of Permission Use in Mobile Apps
Using Text Mining to Infer the Purpose of Permission Use in Mobile AppsJason Hong
 
Making Mashups with Marmite, at CHI 2007
Making Mashups with Marmite, at CHI 2007Making Mashups with Marmite, at CHI 2007
Making Mashups with Marmite, at CHI 2007Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
 
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007Jason Hong
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Jason Hong
 
Printertainment, at CHI 1999
Printertainment, at CHI 1999Printertainment, at CHI 1999
Printertainment, at CHI 1999Jason Hong
 
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...Jason Hong
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002Jason Hong
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 

Viewers also liked (14)

Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
 
Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
Using Text Mining to Infer the Purpose of Permission Use in Mobile AppsUsing Text Mining to Infer the Purpose of Permission Use in Mobile Apps
Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
 
Making Mashups with Marmite, at CHI 2007
Making Mashups with Marmite, at CHI 2007Making Mashups with Marmite, at CHI 2007
Making Mashups with Marmite, at CHI 2007
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
 
Printertainment, at CHI 1999
Printertainment, at CHI 1999Printertainment, at CHI 1999
Printertainment, at CHI 1999
 
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Social Cybersecurity, at Google Security Summit March 2015

Editor's Notes

  1. My controversial statement -> As a research community, we’re overly focused on new mechanisms for cybersecurity Not doing enough to get people to use what’s already out there If I had to guess, adoption of two-factor authentication probably single digits How can we improve people’s awareness, knowledge, and motivation to be secure? Social psychology has studied lots of subtle but powerful influences over people’s behaviors
  2. SOUPS 2014 paper The Effect of Social Influence on Security Sensitivity http://www.cmuchimps.org/publications/the_effect_of_social_influence_on_security_sensitivity_2014 CCS 2014 paper Increasing Security Sensitivity With Social Proof: A Large Scale Experimental Confirmation http://www.cmuchimps.org/publications/increasing_security_sensitivity_with_social_proof_a_large_scale_experimental_confirmation_2014