SlideShare une entreprise Scribd logo
1  sur  12
SocialCybersecurity.org Cori Faklaris | @heycori
Cori Faklaris, PhD researcher, Carnegie Mellon University
BEHAVIOR CHANGE
USING SOCIAL INFLUENCES
SocialCybersecurity.org Cori Faklaris | @heycori
Unintentional insider threat (UIT) can arise because security
tools or infrastructure does not account for social needs.
Social influences can be used to motivate security behaviors.
Join forces with us! We are looking for external collaborators.
MAJOR TAKEAWAYS
2
SocialCybersecurity.org Cori Faklaris | @heycori
“THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY
JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS
Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.
In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
SocialCybersecurity.org Cori Faklaris | @heycori
THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
SocialCybersecurity.org Cori Faklaris | @heycori
SA-6 MEASURES SECURITY ATTITUDE
• Generally, I diligently follow a routine about security practices.
• I always pay attention to experts’ advice about the steps I need to take to keep my
online data and accounts safe.
• I am extremely knowledgeable about all the steps needed to keep my online data and
accounts safe.
• I am extremely motivated to take all the steps needed to keep my online data and
accounts safe.
• I often am interested in articles about security threats.
• I seek out opportunities to learn about security measures that are relevant to me.
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
5
SocialCybersecurity.org Cori Faklaris | @heycori
• Workplace cybersecurity: Sharing
accounts and devices to collaborate on
tasks and to keep costs down.
• Workarounds are norm (ex: password taped to PC)
• Difficult to share and to control access with systems
that presume one user at a time
• Lack of accountability and awareness of one
person’s activities by others
SOCIAL CONTEXTS ARE INFLUENCE
6
Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In
Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at:
https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
SocialCybersecurity.org Cori Faklaris | @heycori
• Reciprocity: People are
driven to repay acts in kind
and to share resources in
a network of obligation
• Liking: People pay
attention to the opinions of
those they admire or who
are similar to themselves
‘WEAPONS OF INFLUENCE’
7
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
• Authority: People tend to
follow the guidance of
others presented as
authority figures or experts
• Social Proof: People look
to those around them for
guidance on how they
should behave
‘WEAPONS OF INFLUENCE’
8
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
SAFESEA BROWSER
PLUGIN FOR
GOOGLE CHROME
9
Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and
Laura Dabbish. 2019. Safesea: A Chrome Plugin to
Crowdsource Privacy Settings. Poster presentation for CMU
Privacy Day at Carnegie Mellon University, Feb. 1, 2019.
Available at: http://cups.cs.cmu.edu/privacy-
day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf
• Helps Facebook users navigate
privacy and security settings.
• Displays crowd and expert
suggestions for settings.
SocialCybersecurity.org Cori Faklaris | @heycori
• Pay people or give them
freebies to share
cybersecurity memes with
your website URL on their
social media accounts
• Use SA-6 along with
system stats and social
media metrics to measure
effectiveness
FREE RESEARCH IDEA
Image source:
https://www.pin
terest.com/The
SACompany/th
e-security-
awareness-
company/
10
SocialCybersecurity.org Cori Faklaris | @heycori
• Create a cybersecurity
social event such as a
game night, a movie night
or a scavenger hunt
• Use SA-6 along with other
scales/survey items to test
whether participants’
attitudes, intentions or
reported behaviors improve
FREE RESEARCH IDEA
Image source:
https://www.amazon.com/ThinkF
un-Hacker-Cybersecurity-Coding-
Girls/dp/B07FXYJ5BC
11
SocialCybersecurity.org Cori Faklaris | @heycori
 Unintentional insider threat (UIT) can
arise because security tools or
infrastructure does not account for
social needs.
 Social influences can be used to
motivate security behaviors.
 Join forces with us! We are looking
for external collaborators.
TWITTER: @heycori
EMAIL: heycori [at] cmu.edu
MAJOR TAKEAWAYS
12

Contenu connexe

Tendances

Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developersanilramnanan
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_biasAnsgar Koene
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyNicolette Reyhani
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Ansgar Koene
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastJeffrey Hunt
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isAxway
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethicskelseybee316
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 

Tendances (20)

Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it is
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 

Similaire à Behavior Change Using Social Influences

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...Cori Faklaris
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook ingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowLucinda Rush
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxrosiecabaniss
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open DataOpen Institute
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
 
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...University of Sydney
 

Similaire à Behavior Change Using Social Influences (20)

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to Know
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open Data
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
 

Plus de Cori Faklaris

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid EdgeCori Faklaris
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AICori Faklaris
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and PrivacyCori Faklaris
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Cori Faklaris
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Cori Faklaris
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”Cori Faklaris
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Cori Faklaris
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...Cori Faklaris
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slidesCori Faklaris
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesCori Faklaris
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning studentCori Faklaris
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineCori Faklaris
 

Plus de Cori Faklaris (15)

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Behavior Change Using Social Influences

  • 1. SocialCybersecurity.org Cori Faklaris | @heycori Cori Faklaris, PhD researcher, Carnegie Mellon University BEHAVIOR CHANGE USING SOCIAL INFLUENCES
  • 2. SocialCybersecurity.org Cori Faklaris | @heycori Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. Social influences can be used to motivate security behaviors. Join forces with us! We are looking for external collaborators. MAJOR TAKEAWAYS 2
  • 3. SocialCybersecurity.org Cori Faklaris | @heycori “THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
  • 4. SocialCybersecurity.org Cori Faklaris | @heycori THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
  • 5. SocialCybersecurity.org Cori Faklaris | @heycori SA-6 MEASURES SECURITY ATTITUDE • Generally, I diligently follow a routine about security practices. • I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. • I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. • I am extremely motivated to take all the steps needed to keep my online data and accounts safe. • I often am interested in articles about security threats. • I seek out opportunities to learn about security measures that are relevant to me. Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: 5
  • 6. SocialCybersecurity.org Cori Faklaris | @heycori • Workplace cybersecurity: Sharing accounts and devices to collaborate on tasks and to keep costs down. • Workarounds are norm (ex: password taped to PC) • Difficult to share and to control access with systems that presume one user at a time • Lack of accountability and awareness of one person’s activities by others SOCIAL CONTEXTS ARE INFLUENCE 6 Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at: https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
  • 7. SocialCybersecurity.org Cori Faklaris | @heycori • Reciprocity: People are driven to repay acts in kind and to share resources in a network of obligation • Liking: People pay attention to the opinions of those they admire or who are similar to themselves ‘WEAPONS OF INFLUENCE’ 7 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 8. SocialCybersecurity.org Cori Faklaris | @heycori • Authority: People tend to follow the guidance of others presented as authority figures or experts • Social Proof: People look to those around them for guidance on how they should behave ‘WEAPONS OF INFLUENCE’ 8 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 9. SocialCybersecurity.org Cori Faklaris | @heycori SAFESEA BROWSER PLUGIN FOR GOOGLE CHROME 9 Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and Laura Dabbish. 2019. Safesea: A Chrome Plugin to Crowdsource Privacy Settings. Poster presentation for CMU Privacy Day at Carnegie Mellon University, Feb. 1, 2019. Available at: http://cups.cs.cmu.edu/privacy- day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf • Helps Facebook users navigate privacy and security settings. • Displays crowd and expert suggestions for settings.
  • 10. SocialCybersecurity.org Cori Faklaris | @heycori • Pay people or give them freebies to share cybersecurity memes with your website URL on their social media accounts • Use SA-6 along with system stats and social media metrics to measure effectiveness FREE RESEARCH IDEA Image source: https://www.pin terest.com/The SACompany/th e-security- awareness- company/ 10
  • 11. SocialCybersecurity.org Cori Faklaris | @heycori • Create a cybersecurity social event such as a game night, a movie night or a scavenger hunt • Use SA-6 along with other scales/survey items to test whether participants’ attitudes, intentions or reported behaviors improve FREE RESEARCH IDEA Image source: https://www.amazon.com/ThinkF un-Hacker-Cybersecurity-Coding- Girls/dp/B07FXYJ5BC 11
  • 12. SocialCybersecurity.org Cori Faklaris | @heycori  Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.  Social influences can be used to motivate security behaviors.  Join forces with us! We are looking for external collaborators. TWITTER: @heycori EMAIL: heycori [at] cmu.edu MAJOR TAKEAWAYS 12