1 / 20

Cyber-crime Science

Cyber-crime Science. Pieter Hartel. The Course. Goals Study cybercrime from a social perspective Organisation Teams of three Do an experiment Write a paper Review other papers Present the paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/. Team. Lecturers

jirair
Download Presentation

Cyber-crime Science

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-crime Science Pieter Hartel

  2. The Course • Goals • Study cybercrime from a social perspective • Organisation • Teams of three • Do an experiment • Write a paper • Review other papers • Present the paper at a conference • http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science

  3. Team • Lecturers • Pieter Hartel (course organisation, computer science) • Marianne Junger (social science) • Teaching assistants • Lorena Montoya • Jan Willem Bullée • Elmer Lastdrager • Inés CarvaljalGallardo Cyber-crime Science

  4. Contents • Theory • What is Crime and Cyber-crime? • Technology (ICT) creates opportunity • Crime Science • Opportunity reduction works • Practice • How to do an opportunity reducing experiment in this course? Cyber-crime Science

  5. Crime and Cyber-crime • Crime • Behaviour commonly considered harmful, serious • Disorder • Lack of order, broader than crime • Cyber-crime • ICT used as a tool, target or place [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science

  6. Porn on video billboard Cyber-crime Science

  7. Cyber-crime is big business [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science

  8. ICT creates opportunity • Offenders know that they run little risk • Targets often don’t understand the risks Cyber-crime Science

  9. Crime Science • Five principles of opportunity reduction • Increase effort • Increase risks • Reduce rewards • Reduce provocation • Remove excuses • Measure the effect of the intervention Cyber-crime Science

  10. Opportunity reduction works Clicked on link (%) [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 10 Cyber-crime Science

  11. Practice Cyber-crime Science

  12. Question • Is an intervention as coursework feasible? • Yes, but it’s hard work • … and it can be a lot of fun • Check out what 43 teams have done in previous years [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science

  13. Interactive trash cans, N=24 Cyber-crime Science

  14. Social Sports leak, N=308 [Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports networks as crime facilitators. Crime Science, 3:Article 8, 2014. http://dx.doi.org/10.1186/s40163-014-0008-z. Cyber-crime Science

  15. Course Schedule PII form Ethical committee team+ topic Draft research proposal Final proposal & slide (5 weeks) APA paper writing Present ideas Present again Experiment & draft paper (9 weeks) Research Methods Reviewing final paper review & slides (6 weeks) Presentations Cyber-crime Science

  16. Help is at hand • What? • Clinics: get feedback or discuss • F2F in Enschede or via Skype • When? • Sign up via the doodle to get a 20-minute timeslot • 12 and 19 September, 3 October and more • More details on website Cyber-crime Science

  17. Examination • By coursework only • Quality of the paper • Quality of the reviews • Quality of the presentations • You will be marked by your peers • And you may not like it… • But the lecturers and TAs are the moderators Cyber-crime Science

  18. FAQ • Team topic (week 1) • What is the crime/disorder and how will you prevent it? • Draft proposal (week 3) • What are the risks for the researchers and the subjects? • What is the control group? • Final draft proposal (week 5) • Does my design work? Do a pilot! • Draft paper (week 14) • Can someone else repeat the experiment? • Final paper (week 18) • Are the results statistically significant? Cyber-crime Science

  19. What to do next? • Sign up via the site • Complete and sign the PII form now • Social science training : 0.5 bonus point • Write 1 A4 Research proposal with: • Background • Method • Three key references • Appendix: Checklist Ethical Committee • For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science

  20. Project ideas • Elmer (e.e.h.lastdrager@utwente.nl) • Phishing on Facebook • Phishing puzzles • Lorena (a.l.montoya@utwente.nl) • Socio-physical differences in the compliance to a request to surrender credentials • Jan-Willem (j.h.bullee@utwente.nl) • Social engineering for software updates • Dynamic digital interventions Cyber-crime Science

More Related