1 / 20

Cyber-crime Science

Cyber-crime Science. Pieter Hartel Elmer Lastdrager. The Course. Goals Study cybercrime from a social perspective Organisation Teams of 2-3 Do an experiment Write a paper Review each other’s papers Present your paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/. Team.

rumor
Download Presentation

Cyber-crime Science

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-crime Science Pieter Hartel Elmer Lastdrager

  2. The Course • Goals • Study cybercrime from a social perspective • Organisation • Teams of 2-3 • Do an experiment • Write a paper • Review each other’s papers • Present your paper at a conference • http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science

  3. Team • Lecturers • Pieter Hartel (course organisation, computer science) • Marianne Junger (social science) • Teaching assistants • Lorena Montoya • Jan Willem Bullée • Elmer Lastdrager • Wilbert Rodenhuis Cyber-crime Science

  4. Contents • Theory • What is Crime and Cyber-crime? • Technology (ICT) creates opportunity • Crime Science • Opportunity reduction works • Practice • How to do an opportunity reducing experiment in this course? Cyber-crime Science

  5. Crime and Cyber-crime • Crime • Behaviour commonly considered harmful, serious • Law • Disorder • Lack of order, broader than crime • Cyber-crime • ICT used as a tool, target or place [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science

  6. Porn on video billboard Cyber-crime Science

  7. Cyber-crime is big business [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science

  8. ICT creates opportunity • Offenders know that they run little risk • Targets often don’t understand the risks Cyber-crime Science

  9. Crime Science • Five principles of opportunity reduction • Increase effort • Increase risks • Reduce rewards • Reduce provocation • Remove excuses • Measure the effect of the intervention Cyber-crime Science

  10. Opportunity reduction works Clicked on link (%) [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 10 Cyber-crime Science

  11. Practice Cyber-crime Science

  12. Question • Is an intervention as coursework feasible? • Yes, but it’s hard work • … and it can be a lot of fun [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science

  13. Simulated ID theft, N=100 Cyber-crime Science

  14. Interactive trash cans, N=24 Cyber-crime Science

  15. Social Sports leak, N=308 Cyber-crime Science

  16. Course Schedule PII form Ethical committee team+ topic Draft research proposal Final proposal & slide (5 weeks) APA paper writing Present ideas Present again Experiment & draft paper (9 weeks) Research Methods Reviewing final paper review & slides (6 weeks) Presentations Cyber-crime Science

  17. Help is at hand • What? • Clinics: get feedback or discuss • Optional, in Enschede • Sign up via the doodle to get a 20-minute timeslot • When? • 25 September 9am - noon (draft proposal) • 9 October 9am - noon (EC, final proposal) • After 22 October on request wed morning (e.g. statistics) • More? • More details on website • Non-UT students: mail / Skype with TA’s Cyber-crime Science

  18. Examination • By coursework only • Team of two or three writes a six page paper • Results on the basis of data collected by team • Peer r eview by students and the lecturers • Mini conference with presenter chosen at the last minute • You will be marked by your peers • And you will not like it… • But the lecturers are the moderators Cyber-crime Science

  19. FAQ • Team topic (week 1) • What is the crime/disorder and how will you prevent it? • Draft proposal (week 3) • What are the risks for the researchers and the subjects? • What is the control group? • Final draft proposal (week 5) • Does my design work? Do a pilot! • Draft paper (week 14) • Can someone else repeat the experiment? • Final paper (week 18) • Are the results statistically significant? Cyber-crime Science

  20. What to do next? • Complete and sign the PII form now • Socialengineering training : 0.5 bonus point • Write 1 A4 Research proposal with: • Background • Method • Three key references • Appendix: Checklist Ethical Committee • For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ • Go to the TAs if you need help Cyber-crime Science

More Related