SlideShare a Scribd company logo
1 of 65
©2015CarnegieMellonUniversity:1
Social Cybersecurity
Applying Social Psychology
to Cybersecurity
Jason Hong
Laura Dabbish
Sauvik Das
Hyun-Jin Kim
HCIC
June 30, 2015
Computer
Human
Interaction:
Mobility
Privacy
Security
©2015CarnegieMellonUniversity:2
or, A Computer Scientist’s
View of HCI and Theory
Jason Hong
Laura Dabbish
Sauvik Das
Hyun-Jin Kim
HCIC
June 30, 2015
Computer
Human
Interaction:
Mobility
Privacy
Security
©2015CarnegieMellonUniversity:3
Introduction
• This is the most unusual talk
I’ve ever given
• Got lots of funny looks from people
You’re going to talk
about theory??
You’re going to talk
about theory??
You’re going to talk
about theory??
Ed Chi Leila Takayama James Landay
©2015CarnegieMellonUniversity:4
Who am I? What am I doing here?
©2015CarnegieMellonUniversity:5
Most of My Work is Athereotical
• I do work in privacy, cybersecurity,
ubicomp
• But little of it grounded in theory
©2015CarnegieMellonUniversity:6
But It’s Not Just Me
Technical HCI work
doesn’t seem to build
a lot on top of each
other’s work. There
doesn’t seem to be a
lot of theory either.*
*not an exact quote
Bob Kraut
(Jedi Master, CMU)
©2015CarnegieMellonUniversity:7
Examples of Tech HCI
©2015CarnegieMellonUniversity:8
Why Little Theory Building in
Tech HCI?
• Is it because it’s engineering?
– I would say no
– Civil Eng has traffic modeling, materials
– MechE has heat transfer, mass transfer
– EE has AC theory, circuit models, signal
©2015CarnegieMellonUniversity:9
Why Little Theory Building in
Tech HCI?
• Science of the artificial
– Outside of speed of light, few limits
to computing
– We make a lot of the rules, and mostly
limited by our imagination and market
• Compare to natural science
– Only one way DNA works
– Only one way brain circuit works
– (And only one research team can win)
©2015CarnegieMellonUniversity:10
Why Little Theory Building in
Tech HCI?
• No clear natural objective function
• Instead, goal of Tech HCI is to:
– Expand frontiers of what’s possible
(expand our imagination)
– Sweep parameter space to understand
principles and tradeoffs
• And while Tech HCI doesn’t build
theory, it will occasionally use it
©2015CarnegieMellonUniversity:11
Themes in This Talk
• Role of theory for Tech HCI?
• Kinds of theories useful for Tech HCI?
– Some theories more useful than others
• Will describe our work on cybersec
– Social Psych / Diffusion of Innovations
• My perspectives:
– Tech HCI research
– (Successful?) startup
– Helped run Master’s of HCI program
©2015CarnegieMellonUniversity:12
Cybersecurity Research Today
• Most research focused on computers
– Protocols, detection, static analysis
• Some research on individuals
– Mostly usability of tools
• But cybersec faces deep problems
– How do people learn cybersecurity?
– How can we fix misconceptions?
– How to change people’s behaviors?
©2015CarnegieMellonUniversity:13
A True Story
Did you hear what happened
to Moe? He slipped on ice
and damaged his laptop. Now
he can’t get his data.
©2015CarnegieMellonUniversity:14
A True Story
Did you hear what happened
to Moe? He slipped on ice
and damaged his laptop. Now
he can’t get his data.
I’m going to back
up my data right
now!
©2015CarnegieMellonUniversity:15
Light Bulb Moment
• Hung around behavioral scientists
for many years
– Learned about basics of social psych
thru osmosis
• Realized that this simple interaction
led to desirable action
©2015CarnegieMellonUniversity:16
How can we use social
influences to help
improve cybersecurity?
©2015CarnegieMellonUniversity:17
Social Proof
©2015CarnegieMellonUniversity:18
• Baseline effectiveness is 35%
©2015CarnegieMellonUniversity:19
©2015CarnegieMellonUniversity:20
• “showing each user pictures of friends who
said they had already voted, generated
340,000 additional votes nationwide”
• “they also discovered that about 4 percent of
those who claimed they had voted were not
telling the truth”
©2015CarnegieMellonUniversity:21
Energy Consumption
©2015CarnegieMellonUniversity:22
Energy Consumption
©2015CarnegieMellonUniversity:23
Social Cybersecurity
• Focus on usability has gotten us far,
but security features rarely adopted
• Pop Quiz: How many of you have
heard of / use these features?
– Two-factor authentication
– Login notifications on Facebook
– Trusted contacts on Facebook
©2015CarnegieMellonUniversity:24
Social Cybersecurity
• Adoption rate typically single digits
[Das et al 2015]
• Why develop new tools if we can’t
get people to adopt existing ones?
©2015CarnegieMellonUniversity:25
Reflection 1
Good Theory Can Offer Inspiration
• Cybersecurity research somewhat
stuck in its approaches
• Diminishing returns after exploring,
need new ideas and perspectives
– See Lakhani08 paper on Innocentive
©2015CarnegieMellonUniversity:26
Social Cybersecurity
Our Team’s Work to Date
• Interviews about why people
changed behaviors and what they
talk about with others [SOUPS 2014]
• Study w/ Facebook evaluating social
interventions [CCS 2014]
• Analysis of who does and doesn’t
adopt features [CSCW 2015]
©2015CarnegieMellonUniversity:27
Semi-Structured Interviews
• Interviewed 19 people
– Mobile authentication
– App installation / uninstallation
– Online privacy settings
• What caused the change?
• Hear about incident thru a friend?
• Talk to others about the change?
Das, S., H.J. Kim, L. Dabbish, and J.I. Hong. The Effect of Social
Influence on Security Sensitivity. SOUPS 2014.
©2015CarnegieMellonUniversity:28
Cybersec Behavior Changes
• 114 behavior changes coded
• 48 had social influences (42%)
– Observing friends (14 of 48)
– Social sensemaking (9 of 48)
– Pranks and demonstrations (8)
– Experiencing security breach (6)
– Sharing access (3)
©2015CarnegieMellonUniversity:29
Insight #1 - Observability
• One person stopped in coffee shop
and asked about the Android 9-dot:
“We were just sitting in a
coffee shop and I wanted
to show somebody
something and [they said], ‘
My phone does not have
that,’ and I was like, ‘I
believe it probably does.’”
©2015CarnegieMellonUniversity:30
Diffusion of Innovations
• Five major factors
for successful
innovations:
– Relative Advantage
– Trialability
– Complexity
– Compatibility
– Observability
©2015CarnegieMellonUniversity:31
Most Cybersecurity not very
Observable
• How strong are Gary’s passwords?
• What privacy settings does Leysia
have for Facebook?
• What does Jofish look for to avoid
phishing attacks?
• Low observability -> hard to diffuse
©2015CarnegieMellonUniversity:32
Reflection 2
Good Theory Offers Vocabulary
• If we weren’t aware of Diffusion of
Innovations, might have overlooked
the comments about Observability
• Act of having a name focuses
©2015CarnegieMellonUniversity:33
Insight #2 – Social Factors
Might Work Against Adoption
• A lot of early adopters tend to be:
– Security experts
– People with clear reason (e.g. job)
– Viewed as “Nutty” or paranoid [Gaw et al 06]
• Brand disenfranchisement
– Illusory correlation between something
(use of security tools) and attributes of
users
©2015CarnegieMellonUniversity:34
Who Uses What Computer?
• “These people aren’t like me”
– (Regardless of whether true or not)
©2015CarnegieMellonUniversity:35
What are Professors Like?
©2015CarnegieMellonUniversity:36
Social Proof + Make
Cybersecurity Observable
• Variants
– Control
– Over # / %
– Only # / %
– Raw # / %
– Some
Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity
With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014.
©2015CarnegieMellonUniversity:37
Method
• Controlled, randomized study
with 50k active Facebook users
– 8 conditions, so N=6250
• Part of annual security awareness
campaign Facebook was going to
run anyway
©2015CarnegieMellonUniversity:38
Results of Experiment
©2015CarnegieMellonUniversity:39
Social Influences on Adoption
• Analyzed 1.5M people on Facebook
– No interventions, existing behaviors
– More adopters a person can see,
more likely to adopt (but J-curve)
– More social circles, stronger effects
– More observable and social feature
(trusted contacts), stronger effects
Das, S., A.D.I. Kramer, L. Dabbish, J.I.Hong. The Role of Social Influence
In Security Feature Adoption. CSCW 2015.
©2015CarnegieMellonUniversity:40
Ongoing Work
• Are there other ways to make
security more observable (+ safe)?
– Note that this is counter to
conventional wisdom of security
• Other social techniques to influence
people’s awareness, knowledge,
motivation?
©2015CarnegieMellonUniversity:41
Reflection 3
Good Theory Should Offer Guidance
• We could have done mass A/B tests
of interventions without theory
– (This is essentially what industry does)
– Instead, Social psych and Diffusion of
Innovations gave us direction
• Blind searches unsatisfying
– Dan Russell’s talk at HCIC 2009
– Eric Brill’s talk at HCIC 2013
©2015CarnegieMellonUniversity:4242
Dan Russell’s HCIC 2009 Slides
©2015CarnegieMellonUniversity:4343
Dan Russell’s HCIC 2009 Slides
©2015CarnegieMellonUniversity:4444
Dan Russell’s HCIC 2009 Slides
©2015CarnegieMellonUniversity:45
What to Name Buttons?
Dan Russell’s HCIC 2009 Slides
©2015CarnegieMellonUniversity:46
Why Unsatisfying?
• What’s generalizable?
• What did we as a community learn?
©2015CarnegieMellonUniversity:47
Reflection 4
Good Theory Should Offer Insight
©2015CarnegieMellonUniversity:48
Reflection 4
Good Theory Should Offer Insight
“For instance, when Appel and Haken completed a
proof of the 4-color map theorem using a massive
automatic computation, it evoked much
controversy.
I interpret the controversy as having little to do
with doubt people had as to the veracity of the
theorem or the correctness of the proof. Rather, it
reflected a continuing desire for human
understanding of a proof, in addition to knowledge
that the theorem is true.”
- William Thurston, On Proof and Progress in Mathematics
©2015CarnegieMellonUniversity:49
Reflection 4
Good Theory Should Offer Insight
• Alternative formulation by Tim Gowers
The Two Cultures of Mathematics
– (i) The point of solving problems is to
understand mathematics better.
– (ii) The point of understanding mathematics is
to become better able to solve problems.
– Mathematicians lie on spectrum
©2015CarnegieMellonUniversity:50
Pasteur’s Quadrant
Good Science + Good Applications
©2015CarnegieMellonUniversity:51
• Situated Action
• Activity Theory
• Distributed Cognition
• Embodied Interaction
• Ethnography
• Fitts’ Law
• Learning science
• Visual Perception
• Social Psych
• Motivation
Advice for Theory Builders
Consider Insight + Guidance
Guidance (What to Build / How to Build it Better)
Insight
• Heuristic Evaluation
• Contextual Inquiry
• 41 Shades of Blue (A/B)
• Iterative Design
• Agile / Lean
©2015CarnegieMellonUniversity:52
• Situated Action
• Activity Theory
• Distributed Cognition
• Embodied Interaction
• Ethnography
• Fitts’ Law
• Learning science
• Visual Perception
• Social Psych
• Motivation
Advice for Theory Builders
Consider Repackaging Too
Guidance (What to Build / How to Build it Better)
Insight
• Heuristic Evaluation
• Contextual Inquiry
• 41 Shades of Blue
• Iterative Design
• Agile / Lean
©2015CarnegieMellonUniversity:53
Wishlist for Tech HCI and
for Master’s Students
• Design Theory
– Service design
– Engagement, stickiness
• Emotional Attachment
• Innovation Theory
– What’s more likely to have impact?
– Product lifecycles
– Feature / Product / Business
©2015CarnegieMellonUniversity:54
Example for Innovation
Christensen’s Disruption Model
©2015CarnegieMellonUniversity:55
Lifecycle of Product
©2015CarnegieMellonUniversity:56
• New product starts out with
lots of chaos
• Eventually dominant design
appears, right combination
of existing features / ideas
©2015CarnegieMellonUniversity:57
• Less innovation in features,
few changes to dominant
design
• More innovation in process
of production
• Dominant design only
obvious in retrospect too
©2015CarnegieMellonUniversity:58
• Extreme focus on cost,
volume, capacity
• Very little innovation
©2015CarnegieMellonUniversity:59
• Cycle starts anew
• But winner of last cycle
rarely winner of next
• Formed network, doesn’t
want to anger them
©2015CarnegieMellonUniversity:60
Conjecture: These Can Help
Tech HCI Research
• Can focus research on the phase
your company is in
– More useful to help industry research
for connecting research to product
– A/B tests only useful in later phases
• Can look forward to next fluid phase
– We already do this
– More useful for academic
©2015CarnegieMellonUniversity:61
Other Advice For Theory
Builders
• Five major factors:
– Relative Advantage
– Trialability
– Complexity
– Compatibility
– Observability
• How might you apply
these to your work?
©2015CarnegieMellonUniversity:62
Summary
• Reflections: Good Theory…
– Can Offer Inspiration
– Offers Vocabulary
– Should Offer Guidance
– Should Offer Insight
• For theory builders: Consider…
– Insight + Building Apps
– Diffusion of Innovations
©2015CarnegieMellonUniversity:63
©2015CarnegieMellonUniversity:64
Reflection N
Be Prepared to Invest a lot of Time
• This work only came about b/c of
hanging around behavioral folks
• And because cross-trained students
• Big open question: how to train PhD
students, given breadth of HCI?
©2015CarnegieMellonUniversity:65
Technical HCI Rarely Uses
or Builds Theory
• Mostly uses low-level perception
and interaction
– Ex. Fitts’ law, psychoacoustics,
visual perception, reaction times
– (Often built into toolkits)

More Related Content

Similar to Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

LGIU - Action Learning Set Presentation
LGIU - Action Learning Set PresentationLGIU - Action Learning Set Presentation
LGIU - Action Learning Set Presentation
Carl Haggerty
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Jason Hong
 

Similar to Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at HCIC 2015 (20)

Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
LGIU - Action Learning Set Presentation
LGIU - Action Learning Set PresentationLGIU - Action Learning Set Presentation
LGIU - Action Learning Set Presentation
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Risk
 
UXPA 2023: Rethinking Design Processes for Inclusion
UXPA 2023: Rethinking Design Processes for InclusionUXPA 2023: Rethinking Design Processes for Inclusion
UXPA 2023: Rethinking Design Processes for Inclusion
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
985 paper presentation -banff 2015
985 paper presentation -banff 2015985 paper presentation -banff 2015
985 paper presentation -banff 2015
 
Social Media: Philosophy and Policy
Social Media: Philosophy and PolicySocial Media: Philosophy and Policy
Social Media: Philosophy and Policy
 
Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data  Influencing the MOOC agenda - analysis of #MOOC Twitter Data
Influencing the MOOC agenda - analysis of #MOOC Twitter Data
 
The Social Nature of Engineering + Innovation
The Social Nature of Engineering + InnovationThe Social Nature of Engineering + Innovation
The Social Nature of Engineering + Innovation
 
The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in Chicago
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
Citizen Innovation Co Creating Social Resources, Smart Government Conf 2011
Citizen Innovation Co Creating Social Resources, Smart Government Conf 2011Citizen Innovation Co Creating Social Resources, Smart Government Conf 2011
Citizen Innovation Co Creating Social Resources, Smart Government Conf 2011
 
SXSW 2015 - Session Highlights
SXSW 2015 - Session Highlights SXSW 2015 - Session Highlights
SXSW 2015 - Session Highlights
 
B1 Predicting developments: Future Technologies and Their Applications
B1 Predicting developments: Future Technologies and Their ApplicationsB1 Predicting developments: Future Technologies and Their Applications
B1 Predicting developments: Future Technologies and Their Applications
 
A student’s right to privacy1
A student’s right to privacy1A student’s right to privacy1
A student’s right to privacy1
 

Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at HCIC 2015