cyber crime science
Download
Skip this Video
Download Presentation
Cyber-crime Science

Loading in 2 Seconds...

play fullscreen
1 / 20

Cyber-crime Science - PowerPoint PPT Presentation


  • 109 Views
  • Uploaded on

Cyber-crime Science. Pieter Hartel. The Course. Goals Study cybercrime from a social perspective Organisation Teams of three Do an experiment Write a paper Review other papers Present the paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/. Team. Lecturers

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Cyber-crime Science' - jirair


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
cyber crime science

Cyber-crime Science

Pieter Hartel

the course
The Course
  • Goals
    • Study cybercrime from a social perspective
  • Organisation
    • Teams of three
    • Do an experiment
    • Write a paper
    • Review other papers
    • Present the paper at a conference
  • http://www.ewi.utwente.nl/~pieter/CCS/

Cyber-crime Science

slide3
Team
  • Lecturers
    • Pieter Hartel (course organisation, computer science)
    • Marianne Junger (social science)
  • Teaching assistants
    • Lorena Montoya
    • Jan Willem Bullée
    • Elmer Lastdrager
    • Inés CarvaljalGallardo

Cyber-crime Science

contents
Contents
  • Theory
    • What is Crime and Cyber-crime?
    • Technology (ICT) creates opportunity
    • Crime Science
    • Opportunity reduction works
  • Practice
    • How to do an opportunity reducing experiment in this course?

Cyber-crime Science

crime and cyber crime
Crime and Cyber-crime
  • Crime
    • Behaviour commonly considered harmful, serious
  • Disorder
    • Lack of order, broader than crime
  • Cyber-crime
    • ICT used as a tool, target or place

[New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25

Cyber-crime Science

porn on video billboard
Porn on video billboard

Cyber-crime Science

cyber crime is big business
Cyber-crime is big business

[And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

Cyber-crime Science

ict creates opportunity
ICT creates opportunity
  • Offenders know that they run little risk
  • Targets often don’t understand the risks

Cyber-crime Science

crime science
Crime Science
  • Five principles of opportunity reduction
    • Increase effort
    • Increase risks
    • Reduce rewards
    • Reduce provocation
    • Remove excuses
  • Measure the effect of the intervention

Cyber-crime Science

opportunity reduction works
Opportunity reduction works

Clicked on link (%)

[Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536

10

Cyber-crime Science

slide11
Practice

Cyber-crime Science

question
Question
  • Is an intervention as coursework feasible?
    • Yes, but it’s hard work
    • … and it can be a lot of fun
  • Check out what 43 teams have done in previous years

[Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/

Cyber-crime Science

interactive trash cans n 24
Interactive trash cans, N=24

Cyber-crime Science

social sports leak n 308
Social Sports leak, N=308

[Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports networks as crime facilitators. Crime Science, 3:Article 8, 2014. http://dx.doi.org/10.1186/s40163-014-0008-z.

Cyber-crime Science

course schedule
Course Schedule

PII form

Ethical committee

team+

topic

Draft

research

proposal

Final

proposal &

slide

(5 weeks)

APA paper writing

Present ideas

Present again

Experiment & draft paper

(9 weeks)

Research Methods

Reviewing

final paper

review &

slides

(6 weeks)

Presentations

Cyber-crime Science

help is at hand
Help is at hand
  • What?
    • Clinics: get feedback or discuss
    • F2F in Enschede or via Skype
  • When?
    • Sign up via the doodle to get a 20-minute timeslot
    • 12 and 19 September, 3 October and more
  • More details on website

Cyber-crime Science

examination
Examination
  • By coursework only
    • Quality of the paper
    • Quality of the reviews
    • Quality of the presentations
  • You will be marked by your peers
    • And you may not like it…
    • But the lecturers and TAs are the moderators

Cyber-crime Science

slide18
FAQ
  • Team topic (week 1)
    • What is the crime/disorder and how will you prevent it?
  • Draft proposal (week 3)
    • What are the risks for the researchers and the subjects?
    • What is the control group?
  • Final draft proposal (week 5)
    • Does my design work? Do a pilot!
  • Draft paper (week 14)
    • Can someone else repeat the experiment?
  • Final paper (week 18)
    • Are the results statistically significant?

Cyber-crime Science

what to do next
What to do next?
  • Sign up via the site
  • Complete and sign the PII form now
  • Social science training : 0.5 bonus point
  • Write 1 A4 Research proposal with:
    • Background
    • Method
    • Three key references
    • Appendix: Checklist Ethical Committee
  • For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/

Cyber-crime Science

project ideas
Project ideas
  • Elmer ([email protected])
    • Phishing on Facebook
    • Phishing puzzles
  • Lorena ([email protected])
    • Socio-physical differences in the compliance to a request to surrender credentials
  • Jan-Willem ([email protected])
    • Social engineering for software updates
    • Dynamic digital interventions

Cyber-crime Science

ad