SlideShare uma empresa Scribd logo
1 de 12
SocialCybersecurity.org Cori Faklaris | @heycori
Cori Faklaris, PhD researcher, Carnegie Mellon University
BEHAVIOR CHANGE
USING SOCIAL INFLUENCES
SocialCybersecurity.org Cori Faklaris | @heycori
Unintentional insider threat (UIT) can arise because security
tools or infrastructure does not account for social needs.
Social influences can be used to motivate security behaviors.
Join forces with us! We are looking for external collaborators.
MAJOR TAKEAWAYS
2
SocialCybersecurity.org Cori Faklaris | @heycori
“THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY
JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS
Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.
In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
SocialCybersecurity.org Cori Faklaris | @heycori
THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
SocialCybersecurity.org Cori Faklaris | @heycori
SA-6 MEASURES SECURITY ATTITUDE
• Generally, I diligently follow a routine about security practices.
• I always pay attention to experts’ advice about the steps I need to take to keep my
online data and accounts safe.
• I am extremely knowledgeable about all the steps needed to keep my online data and
accounts safe.
• I am extremely motivated to take all the steps needed to keep my online data and
accounts safe.
• I often am interested in articles about security threats.
• I seek out opportunities to learn about security measures that are relevant to me.
Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium
on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf
On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following:
5
SocialCybersecurity.org Cori Faklaris | @heycori
• Workplace cybersecurity: Sharing
accounts and devices to collaborate on
tasks and to keep costs down.
• Workarounds are norm (ex: password taped to PC)
• Difficult to share and to control access with systems
that presume one user at a time
• Lack of accountability and awareness of one
person’s activities by others
SOCIAL CONTEXTS ARE INFLUENCE
6
Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In
Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at:
https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
SocialCybersecurity.org Cori Faklaris | @heycori
• Reciprocity: People are
driven to repay acts in kind
and to share resources in
a network of obligation
• Liking: People pay
attention to the opinions of
those they admire or who
are similar to themselves
‘WEAPONS OF INFLUENCE’
7
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
• Authority: People tend to
follow the guidance of
others presented as
authority figures or experts
• Social Proof: People look
to those around them for
guidance on how they
should behave
‘WEAPONS OF INFLUENCE’
8
Robert B. Cialdini. 2008.
Influence (5th Edition). A.
Michel Port Harcourt.
ISBN-10: 9780205609994
SocialCybersecurity.org Cori Faklaris | @heycori
SAFESEA BROWSER
PLUGIN FOR
GOOGLE CHROME
9
Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and
Laura Dabbish. 2019. Safesea: A Chrome Plugin to
Crowdsource Privacy Settings. Poster presentation for CMU
Privacy Day at Carnegie Mellon University, Feb. 1, 2019.
Available at: http://cups.cs.cmu.edu/privacy-
day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf
• Helps Facebook users navigate
privacy and security settings.
• Displays crowd and expert
suggestions for settings.
SocialCybersecurity.org Cori Faklaris | @heycori
• Pay people or give them
freebies to share
cybersecurity memes with
your website URL on their
social media accounts
• Use SA-6 along with
system stats and social
media metrics to measure
effectiveness
FREE RESEARCH IDEA
Image source:
https://www.pin
terest.com/The
SACompany/th
e-security-
awareness-
company/
10
SocialCybersecurity.org Cori Faklaris | @heycori
• Create a cybersecurity
social event such as a
game night, a movie night
or a scavenger hunt
• Use SA-6 along with other
scales/survey items to test
whether participants’
attitudes, intentions or
reported behaviors improve
FREE RESEARCH IDEA
Image source:
https://www.amazon.com/ThinkF
un-Hacker-Cybersecurity-Coding-
Girls/dp/B07FXYJ5BC
11
SocialCybersecurity.org Cori Faklaris | @heycori
 Unintentional insider threat (UIT) can
arise because security tools or
infrastructure does not account for
social needs.
 Social influences can be used to
motivate security behaviors.
 Join forces with us! We are looking
for external collaborators.
TWITTER: @heycori
EMAIL: heycori [at] cmu.edu
MAJOR TAKEAWAYS
12

Mais conteúdo relacionado

Mais procurados

Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developersanilramnanan
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_biasAnsgar Koene
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyNicolette Reyhani
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Ansgar Koene
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastJeffrey Hunt
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isAxway
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethicskelseybee316
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 

Mais procurados (20)

Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17Young people's policy recommendations on algorithm fairness web sci17
Young people's policy recommendations on algorithm fairness web sci17
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
IL CTO Presentation at Tech Feast
IL CTO Presentation at Tech FeastIL CTO Presentation at Tech Feast
IL CTO Presentation at Tech Feast
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Public Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it isPublic Cloud is Not Always the Answer... but Sometimes it is
Public Cloud is Not Always the Answer... but Sometimes it is
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 

Semelhante a Behavior Change Using Social Influences

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...Cori Faklaris
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook ingridkreidler
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowLucinda Rush
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxrosiecabaniss
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open DataOpen Institute
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
 
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...University of Sydney
 

Semelhante a Behavior Change Using Social Influences (20)

How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
Using What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to KnowUsing What They Know to Teach Them What They Need to Know
Using What They Know to Teach Them What They Need to Know
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
The Potential of Open Data
The Potential of Open DataThe Potential of Open Data
The Potential of Open Data
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
‘Damn those ethics boards!’ How to make sense of an ethics committee approach...
 

Mais de Cori Faklaris

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid EdgeCori Faklaris
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AICori Faklaris
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and PrivacyCori Faklaris
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Cori Faklaris
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Cori Faklaris
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”Cori Faklaris
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Cori Faklaris
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...Cori Faklaris
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slidesCori Faklaris
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesCori Faklaris
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning studentCori Faklaris
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineCori Faklaris
 

Mais de Cori Faklaris (15)

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Último

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Behavior Change Using Social Influences

  • 1. SocialCybersecurity.org Cori Faklaris | @heycori Cori Faklaris, PhD researcher, Carnegie Mellon University BEHAVIOR CHANGE USING SOCIAL INFLUENCES
  • 2. SocialCybersecurity.org Cori Faklaris | @heycori Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs. Social influences can be used to motivate security behaviors. Join forces with us! We are looking for external collaborators. MAJOR TAKEAWAYS 2
  • 3. SocialCybersecurity.org Cori Faklaris | @heycori “THE UIT” – LEGITIMATE USER WHO ACCIDENTALLY JEOPARDIZES SECURITY THROUGH LEAKS OR ERRORS Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, and Jennifer Cowley. 2014. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. In 2014 IEEE Security and Privacy Workshops, 236–250. DOI: https://doi.org/10.1109/SPW.2014.39
  • 4. SocialCybersecurity.org Cori Faklaris | @heycori THIS HUMAN-IN-THE-LOOP IS A CRITICAL DEFENSE POINT
  • 5. SocialCybersecurity.org Cori Faklaris | @heycori SA-6 MEASURES SECURITY ATTITUDE • Generally, I diligently follow a routine about security practices. • I always pay attention to experts’ advice about the steps I need to take to keep my online data and accounts safe. • I am extremely knowledgeable about all the steps needed to keep my online data and accounts safe. • I am extremely motivated to take all the steps needed to keep my online data and accounts safe. • I often am interested in articles about security threats. • I seek out opportunities to learn about security measures that are relevant to me. Cori Faklaris, Laura Dabbish and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Proceedings of the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Berkeley, CA, USA. Available at: https://www.usenix.org/system/files/soups2019-faklaris.pdf On a scale of 1=Strongly Disagree to 5=Strongly Agree, rate your level of agreement with the following: 5
  • 6. SocialCybersecurity.org Cori Faklaris | @heycori • Workplace cybersecurity: Sharing accounts and devices to collaborate on tasks and to keep costs down. • Workarounds are norm (ex: password taped to PC) • Difficult to share and to control access with systems that presume one user at a time • Lack of accountability and awareness of one person’s activities by others SOCIAL CONTEXTS ARE INFLUENCE 6 Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, and Laura Dabbish. 2019. Normal and Easy: Account Sharing Practices in the Workplace. In Proceedings of the ACM: Human-Computer Interaction, Vol. 3, Issue CSCW, November 2019. ACM, New York, NY, USA. Available at: https://drive.google.com/file/d/17xb07vuKjPrgoKNzBSGouTgqNNEeACF0/view
  • 7. SocialCybersecurity.org Cori Faklaris | @heycori • Reciprocity: People are driven to repay acts in kind and to share resources in a network of obligation • Liking: People pay attention to the opinions of those they admire or who are similar to themselves ‘WEAPONS OF INFLUENCE’ 7 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 8. SocialCybersecurity.org Cori Faklaris | @heycori • Authority: People tend to follow the guidance of others presented as authority figures or experts • Social Proof: People look to those around them for guidance on how they should behave ‘WEAPONS OF INFLUENCE’ 8 Robert B. Cialdini. 2008. Influence (5th Edition). A. Michel Port Harcourt. ISBN-10: 9780205609994
  • 9. SocialCybersecurity.org Cori Faklaris | @heycori SAFESEA BROWSER PLUGIN FOR GOOGLE CHROME 9 Gustavo Umbelino, Rosie Sun, Cori Faklaris, Jason I. Hong, and Laura Dabbish. 2019. Safesea: A Chrome Plugin to Crowdsource Privacy Settings. Poster presentation for CMU Privacy Day at Carnegie Mellon University, Feb. 1, 2019. Available at: http://cups.cs.cmu.edu/privacy- day/2019/posters/Sun_Falarkis_Safesea_A_Chrome_Plugin.pdf • Helps Facebook users navigate privacy and security settings. • Displays crowd and expert suggestions for settings.
  • 10. SocialCybersecurity.org Cori Faklaris | @heycori • Pay people or give them freebies to share cybersecurity memes with your website URL on their social media accounts • Use SA-6 along with system stats and social media metrics to measure effectiveness FREE RESEARCH IDEA Image source: https://www.pin terest.com/The SACompany/th e-security- awareness- company/ 10
  • 11. SocialCybersecurity.org Cori Faklaris | @heycori • Create a cybersecurity social event such as a game night, a movie night or a scavenger hunt • Use SA-6 along with other scales/survey items to test whether participants’ attitudes, intentions or reported behaviors improve FREE RESEARCH IDEA Image source: https://www.amazon.com/ThinkF un-Hacker-Cybersecurity-Coding- Girls/dp/B07FXYJ5BC 11
  • 12. SocialCybersecurity.org Cori Faklaris | @heycori  Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.  Social influences can be used to motivate security behaviors.  Join forces with us! We are looking for external collaborators. TWITTER: @heycori EMAIL: heycori [at] cmu.edu MAJOR TAKEAWAYS 12