SlideShare uma empresa Scribd logo
1 de 30
Designing Cybersecurity
Policies with Field Experiments
Gene Moo Lee
University of Texas at Austin
Joint work with Shu He, John S. Quarterman, Andrew B. Whinston
Supported by NSF 1228990
February 25, 2015
KAIST
Gene Moo Lee, KAIST, Feb 2015
“Although the threats are serious and they
constantly evolve, I believe that if we address them
effectively, we can ensure that the Internet remains
an engine for economic growth and a platform for
the free exchange of ideas.”
—Barack Obama
2
Gene Moo Lee, KAIST, Feb 2015
Motivation
• Inadequate cybersecurity is a serious threat
• avg cost $3.5 million in 2013, 15% increase
• # of compromises increased by 25%
• data breaches of 2.6 million Target consumers
• U.S. government’s measures
• Cybersecurity Policy Review (2009)
• Executive Order 13636 (2013) “Improving Critical
Infrastructure Cybersecurity”
3
Gene Moo Lee, KAIST, Feb 2015
Approaches
• Technical approaches:
• spam filtering, intrusion detection systems (IDS), digital
forensics
• Sahami et al. (1998), Cormack and Lynam (2007), Denning
(1987), Lee and Stolfo (1998), Casey (2011), Taylor et al.
(2014)
• Economic approaches:
• underinvestment due to (1) information asymmetry, (2)
network externalities, (3) moral hazards
• van Eeten et al. (2011), Moore and Clayton (2011), Arora
et al. (2004), D’Arcy et al. (2009), Wood and Rowe (2011)
4
Gene Moo Lee, KAIST, Feb 2015
Our approach
• We found evidence that spam evaluation publication help improving
security levels in country level
• Quarterman et al. (2012), Qian et al. (2013)
• Use outbound spam to estimate latent security level
• 90% spam is from compromised computers controlled by botnets
(Rao and Reiley 2012, Moore and Clayton 2011)
• Ultimate goal:
• Evaluate the effectiveness in organizational level
• government sponsored institution to monitor and evaluate
organizational security levels (Moody’s, S&P for bonds)
• Counterfactual policy analysis with randomized field experiments
5
Gene Moo Lee, KAIST, Feb 2015
Research questions
1. Our goal is to set up an independent institution to evaluate
and monitor all organizations’ cybersecurity level
2. Does information disclosure change organizational
behaviour? In other words, spam reduce?
• Method: Randomized field experiment
• Two treatment groups with different info disclosure
• Two cycles of emails at January/March 2014
• A website built on Google cloud
6
Gene Moo Lee, KAIST, Feb 2015
Experimental design
• 7919 US organizations, three groups: control, private, public
• Private treatment: email with spam volume, rank, IP addr
• Public treatment: email + publication in public website
7
Gene Moo Lee, KAIST, Feb 2015
Randomization
• Stratification with industry sectors and IP counts
• Pair-wise matching with pre-experimental spam volume
• Re-randomization: 10,000 times and power calculation
8
Gene Moo Lee, KAIST, Feb 2015
Treatment channel: email
9
Gene Moo Lee, KAIST, Feb 2015
Website: search engine
10
• http://cloud.spamrankings.net
Gene Moo Lee, KAIST, Feb 2015
Website: overall stats
11
Gene Moo Lee, KAIST, Feb 2015
Website: detail charts
12
Gene Moo Lee, KAIST, Feb 2015
System implementation
• Back end: data collector, peer ranker, web generator, MySQL, JSON
• Front end: Google cloud, search engine, analytics
13
Gene Moo Lee, KAIST, Feb 2015
Data: CBL and PSBL
14
• A spam blocklist uses spamtraps to collect IP adresses
sending out spams:
• CBL: http://cbl.abuseat.org/
• PSBL: http://psbl.org/
• Spamtrap
• honeypot used to collect spam
• email addresses not for legit communications
• CBL daily avg data
• 8 million IP, 190K netblocks, 21K ASNs, 200 countries
Gene Moo Lee, KAIST, Feb 2015
Organizational spam data
15
• IP > netblock > ASN > organization
• IP > netblock: IP lookup
• netblock > ASN: Team Cymru
• ASN > org: algorithm + manual inspection
• Organization data from LexisNexis
• 7919 U.S. organizations identified
• Industry codes: SIC, NAICS
• Public/private, # employees
Gene Moo Lee, KAIST, Feb 2015
Org level spam volume and IP address
16
Gene Moo Lee, KAIST, Feb 2015
Industry sectors
17
Gene Moo Lee, KAIST, Feb 2015
Industry level spam volume/host
18
Gene Moo Lee, KAIST, Feb 2015
Hypothesis development
1. Information disclosure effect
2. Publicity effect
3. Pre-experimental security level
4. Industry competition level
19
Gene Moo Lee, KAIST, Feb 2015
Info sharing and publicity effects (H1, 2)
20
Gene Moo Lee, KAIST, Feb 2015
Large spammers (H3)
21
Gene Moo Lee, KAIST, Feb 2015
Competition (H4)
22
Gene Moo Lee, KAIST, Feb 2015
Empirical analysis summary
1. Private info sharing doesn’t work
2. Publicity matters
3. Organizations with (1) large spam, (2)
less competition reacted
4. Peer effect exists after the treatments.
Stronger with treatment groups.
23
Gene Moo Lee, KAIST, Feb 2015
Robustness check
1. Placebo test: change experiment time
2. Subsample analysis: only include
moderate spammers
3. Alternative pre-experimental spam
measure: 6, 4, 2, months
4. Control variables
24
Gene Moo Lee, KAIST, Feb 2015
Directions
1. Robust security evaluation: spam,
phishing, DDoS, etc.
2. Different environment: China, Korea
3. Treatment channel: social media
4. Cybersecurity insurance
5. Cloud security
25
Gene Moo Lee, KAIST, Feb 2015
Thank you!
Contact: gene@cs.utexas.edu
26
Gene Moo Lee, KAIST, Feb 2015
References (1)
[1] Adelsman, Rony M., and Andrew B. Whinston (1977). "Sophisticated voting with information
for two voting functions." Journal of Economic Theory 15, no. 1: pp. 145-159.
[2] Anderson, Axel, and Lones Smith. "Dynamic Deception." American Economic Review 103, no.
7 (2013): 2811-47.
[3] Anderson, Ross (2001). "Why information security is hard: An economic perspective." IEEE
Computer Security Applications Conference, pp. 358-365.
[4] Aral, Sinan, and Dylan Walker. "Identifying influential and susceptible members of social
networks." Science 337, no. 6092 (2012): pp. 337-341.
[5] Arora, Ashish, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang (2004).
"Impact of vulnerability disclosure and patch availability-an empirical analysis." Workshop on
Economics of Information Security, vol. 24, pp. 1268-1287.
[6] Bauer, Johannes, and Michael van Eeten (2009). “Cybersecurity: Stakeholder incentives, externalities,
and policy options.” Telecommunications Policy, Vol. 33, pp. 706-719.
[7] Blei, David M., Andrew Y. Ng, and Michael I. Jordan (2003). "Latent dirichlet allocation."
Journal of Machine Learning Research 3: pp. 993-1022.
[8] Bratko, Andrej, Gordon V. Cormack, Bogdan Filipic, Thomas R. Lynam, and Blaz Zupan
(2006). Journal of Machine Learning Research 6: pp. 2673-2698.
[9] Bruhn, Miriam, and David McKenzie (2008). "In pursuit of balance: Randomization in practice
in development field experiments." World Bank Policy Research Working Paper Series.
[10] Casey, Eoghan (2011). Digital evidence and computer crime: Forensic science, computers and
the Internet. Academic Press.
[11] Cormack, Gordon V., and Thomas R. Lynam (2007). “Online supervised spam filter evaluation.”
ACM Transaction on Information Systems, Vol. 25(3)
27
Gene Moo Lee, KAIST, Feb 2015
References (2)
[12] D’Arcy, John, Anat Hovav, and Dennis Galletta (2009). "User awareness of security countermeasures
and its impact on information systems misuse: A deterrence approach." Information
Systems Research 20, no. 1: pp. 79-98.
[13] Denning, Dorothy E. (1987). “An intrusion-detection model.” IEEE Transactions on Software
Engineering, Vol. 13(2): pp. 222-232.
[14] Dharmapurikar, Sarang, Praveen Krishnamurthy, and David E. Taylor (2003). “Longest prefix
matching using bloom filters.” Proceedings of the ACM SIGCOMM Conference: pp. 201-212.
[15] Dice, Lee R. (1945). “Measures of the amount of ecologic association between species.” Ecology
26(3): pp. 297-302.
[16] Duflo, Esther, Rachel Glennerster, and Michael Kremer. "Using randomization in development
economics research: A toolkit." Handbook of development economics 4 (2007): 3895-3962.
[17] Fracassi, Cesare (2014). "Corporate finance policies and social networks." In AFA 2011 Denver
Meetings Paper.
[18] Festinger, Leon. "A theory of social comparison processes." Human relations 7, no. 2 (1954):
117-140.
[19] Gal-Or, Esther, and Anindya Ghose (2005). "The economic incentives for sharing security
information." Information Systems Research 16, no. 2: pp. 186-208.
[20] Graham, Bryan S. (2008). "Identifying social interactions through conditional variance restrictions."
Econometrica 76, no. 3: pp. 643-660.
[21] Harper, Yan Chen, F. Maxwell, Joseph Konstan, and Sherry Xin Li. "Social comparisons and
contributions to online communities: A field experiment on movielens." The American economic
review (2010): 1358-1398.
[22] Harrison, Glenn W., and John A. List (2004). "Field experiments." Journal of Economic Literature:
pp. 1009-1055.
[23] Kugler, Logan (2014). “Online Privacy: Regional Differences.” Communications of the ACM,
Vol. 58 No. 2, pp. 18-20.
28
Gene Moo Lee, KAIST, Feb 2015
References (3)
[24] Krebs, Brian (2014). Spam Nation: The Inside Story of Organized Cybercrime - from Global
Epidemic to Your Front Door. Sourcebooks, Inc.
[25] Lee, Wenke, and Salvatore J. Stolfo (1998). “Data mining approaches for intrusion detection.”
Proceedings of 7th USENIX Security Symposium.
[26] Levchenko, Kirill, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris
Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas
Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage (2011). "Click Trajectories:
End-to-End Analysis of the Spam Value Chain." IEEE Symposium on Security and Privacy.
[27] Moore, Tyler and Richard Clayton (2011). "The Impact of Public Information on Phishing
Attack and Defense." Communications & Strategies 81.
[28] Morgan, Kari Lock, and Donald B. Rubin (2012). "Rerandomization to improve covariate
balance in experiments." Annals of Statistics 40, no. 2: pp. 1263-1282.
[29] Popadak, Jillian A. (2012). "Dividend Payments as a Response to Peer Influence." Available
at SSRN 2170561, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2170561.
[30] Pitsillidis, Andreas, Chris Kanich, Geoffrey M Voelker, Kirill Levchenko, Stefan Savage (2012).
“Taster’s choice: A comparative analysis of spam feeds.” Proceedings of the 2012 ACM Internet
Meassure Conference: pp. 427-440.
[31] Rao, Justin M., and David H. Reiley (2012). "The economics of spam." Journal of Economic
Perspectives 26, no. 3: pp. 87-110.
[32] Roesch, Martin (1999). “SNORT: Lightweight intrusion detection for networks.” Proceedings
of 13th Large Installation System Administration Conference, pp. 229-238.
[33] Rothschild, Michael, and Joseph Stiglitz (1992). “Equilibrium in competitive insurance markets:
An essay on the economics of imperfect information.” Springer Netherlands.
[34] Sahami, Mehran, Susan Dumais, David Heckerman, and Eric Horvitz (1998). “A Bayesian
approach to filtering junk e-mail.” Learning for Text Categorization 62: pp. 98-105.
29
Gene Moo Lee, KAIST, Feb 2015
References (4)
[35] Shue, Kelly (2013). "Executive networks and firm policies: Evidence from the random assignment
of MBA peers." Review of Financial Studies 26, no. 6: pp. 1401-1442.
[36] Tang, Qian, Leigh Linden, John S. Quarterman, and Andrew B. Whinston (2013). “Improving
Internet security through social information and social comparison: A field quasi-experiment.”
In Workshop on the Economics of Information Security.
[37] Taylor, Robert W., Eric J. Fritsch, and John Liederbach (2014). Digital crime and digital
terrorism. Prentice Hall Press.
[38] Taylor, Shelley E., and Marci Lobel (1989). "Social comparison activity under threat: downward
evaluation and upward contacts." Psychological review 96, no. 4: p. 569.
[39] van Eeten, M., H. Asghari, J. M. Bauer, and S. Tabatabaie (2011). "Internet service providers
and botnet mitigation: A fact-finding study on the Dutch market." Delft University of Technology.
[40] Wood, Dallas, and Brent Rowe (2011). "Assessing home Internet users’ demand for security:
Will they pay ISPs?" Workshop of Economics of Information Security.
30

Mais conteúdo relacionado

Mais procurados

Developing A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry IntelligenceDeveloping A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry Intelligence
Gene Moo Lee
 

Mais procurados (20)

A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...A method to evaluate the reliability of social media data for social network ...
A method to evaluate the reliability of social media data for social network ...
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
Explainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopExplainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loop
 
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
 
How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)How to social scientists use link data (11 june2010)
How to social scientists use link data (11 june2010)
 
Literature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chainLiterature Review on Social Networking in Supply chain
Literature Review on Social Networking in Supply chain
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow
 
Developing A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry IntelligenceDeveloping A Big Data Analytics Framework for Industry Intelligence
Developing A Big Data Analytics Framework for Industry Intelligence
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Data Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data InfrastructuresData Journalism and the Remaking of Data Infrastructures
Data Journalism and the Remaking of Data Infrastructures
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
 
Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)Social Media Mining - Chapter 10 (Behavior Analytics)
Social Media Mining - Chapter 10 (Behavior Analytics)
 
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...Computational Social Science:The Collaborative Futures of Big Data, Computer ...
Computational Social Science:The Collaborative Futures of Big Data, Computer ...
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine Learning
 
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsIntroduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT Tools
 
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
 
The story of Data Stories
The story of Data StoriesThe story of Data Stories
The story of Data Stories
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
 
Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation
 

Destaque (11)

CP Events - Profile p2
CP Events - Profile p2CP Events - Profile p2
CP Events - Profile p2
 
Leading Teams - jay-cee
Leading Teams - jay-ceeLeading Teams - jay-cee
Leading Teams - jay-cee
 
Los animales
Los animalesLos animales
Los animales
 
Presentación en FNAC Málaga del poemario 'Poso de ceniza'
Presentación en FNAC Málaga del poemario 'Poso de ceniza'Presentación en FNAC Málaga del poemario 'Poso de ceniza'
Presentación en FNAC Málaga del poemario 'Poso de ceniza'
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Ensayo
EnsayoEnsayo
Ensayo
 
效果图
效果图效果图
效果图
 
34
3434
34
 
To Know it all....
To Know it all....To Know it all....
To Know it all....
 
Br. luis alejandro mendoza
Br. luis alejandro mendozaBr. luis alejandro mendoza
Br. luis alejandro mendoza
 
2016 11-18.lliurament
2016 11-18.lliurament2016 11-18.lliurament
2016 11-18.lliurament
 

Semelhante a Designing Cybersecurity Policies with Field Experiments

Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
Sonu Gupta
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
croysierkathey
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
philipnelson29183
 
Post 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docxPost 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docx
stilliegeorgiana
 

Semelhante a Designing Cybersecurity Policies with Field Experiments (20)

BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
Big Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and OpportunitiesBig Data Analytics: Challenges and Opportunities
Big Data Analytics: Challenges and Opportunities
 
1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptx1. Data Science overview - part1.pptx
1. Data Science overview - part1.pptx
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English VersionA survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English Version
 
Big data analytics and its impact on internet users
Big data analytics and its impact on internet usersBig data analytics and its impact on internet users
Big data analytics and its impact on internet users
 
4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)4차 산업혁명 시대의 싱크탱크의 변화(kdi)
4차 산업혁명 시대의 싱크탱크의 변화(kdi)
 
The What, Why and How of Big Data
The What, Why and How of Big DataThe What, Why and How of Big Data
The What, Why and How of Big Data
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big Data
 
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Reproducibility from an infomatics perspective
Reproducibility from an infomatics perspectiveReproducibility from an infomatics perspective
Reproducibility from an infomatics perspective
 
Scientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics PerspectiveScientific Reproducibility from an Informatics Perspective
Scientific Reproducibility from an Informatics Perspective
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Post 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docxPost 1Many of you have heard the popular slogans and taglines .docx
Post 1Many of you have heard the popular slogans and taglines .docx
 

Mais de Gene Moo Lee

Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Gene Moo Lee
 
Improving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction AccuracyImproving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction Accuracy
Gene Moo Lee
 
Improving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic EngineeringImproving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic Engineering
Gene Moo Lee
 
Modeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social NetworksModeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social Networks
Gene Moo Lee
 
Mobile Video Delivery via Human Movement
Mobile Video Delivery via Human MovementMobile Video Delivery via Human Movement
Mobile Video Delivery via Human Movement
Gene Moo Lee
 
Towards modeling M&A in high tech industries
Towards modeling M&A in high tech industriesTowards modeling M&A in high tech industries
Towards modeling M&A in high tech industries
Gene Moo Lee
 

Mais de Gene Moo Lee (10)

Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
Content Complexity, Similarity, and Consistency in Social Media: A Deep Learn...
 
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
Analyzing the spillover roles of user-generated reviews on purchases: Evidenc...
 
Towards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep LearningTowards Advanced Business Analytics using Text Mining and Deep Learning
Towards Advanced Business Analytics using Text Mining and Deep Learning
 
Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...Towards a better measure of business proximity: Topic modeling for industry i...
Towards a better measure of business proximity: Topic modeling for industry i...
 
Introduction to NP Completeness
Introduction to NP CompletenessIntroduction to NP Completeness
Introduction to NP Completeness
 
Improving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction AccuracyImproving Sketch Reconstruction Accuracy
Improving Sketch Reconstruction Accuracy
 
Improving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic EngineeringImproving the Interaction between Overlay Routing and Traffic Engineering
Improving the Interaction between Overlay Routing and Traffic Engineering
 
Modeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social NetworksModeling Human Mobility using Location Based Social Networks
Modeling Human Mobility using Location Based Social Networks
 
Mobile Video Delivery via Human Movement
Mobile Video Delivery via Human MovementMobile Video Delivery via Human Movement
Mobile Video Delivery via Human Movement
 
Towards modeling M&A in high tech industries
Towards modeling M&A in high tech industriesTowards modeling M&A in high tech industries
Towards modeling M&A in high tech industries
 

Último

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 

Último (20)

VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Designing Cybersecurity Policies with Field Experiments

  • 1. Designing Cybersecurity Policies with Field Experiments Gene Moo Lee University of Texas at Austin Joint work with Shu He, John S. Quarterman, Andrew B. Whinston Supported by NSF 1228990 February 25, 2015 KAIST
  • 2. Gene Moo Lee, KAIST, Feb 2015 “Although the threats are serious and they constantly evolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine for economic growth and a platform for the free exchange of ideas.” —Barack Obama 2
  • 3. Gene Moo Lee, KAIST, Feb 2015 Motivation • Inadequate cybersecurity is a serious threat • avg cost $3.5 million in 2013, 15% increase • # of compromises increased by 25% • data breaches of 2.6 million Target consumers • U.S. government’s measures • Cybersecurity Policy Review (2009) • Executive Order 13636 (2013) “Improving Critical Infrastructure Cybersecurity” 3
  • 4. Gene Moo Lee, KAIST, Feb 2015 Approaches • Technical approaches: • spam filtering, intrusion detection systems (IDS), digital forensics • Sahami et al. (1998), Cormack and Lynam (2007), Denning (1987), Lee and Stolfo (1998), Casey (2011), Taylor et al. (2014) • Economic approaches: • underinvestment due to (1) information asymmetry, (2) network externalities, (3) moral hazards • van Eeten et al. (2011), Moore and Clayton (2011), Arora et al. (2004), D’Arcy et al. (2009), Wood and Rowe (2011) 4
  • 5. Gene Moo Lee, KAIST, Feb 2015 Our approach • We found evidence that spam evaluation publication help improving security levels in country level • Quarterman et al. (2012), Qian et al. (2013) • Use outbound spam to estimate latent security level • 90% spam is from compromised computers controlled by botnets (Rao and Reiley 2012, Moore and Clayton 2011) • Ultimate goal: • Evaluate the effectiveness in organizational level • government sponsored institution to monitor and evaluate organizational security levels (Moody’s, S&P for bonds) • Counterfactual policy analysis with randomized field experiments 5
  • 6. Gene Moo Lee, KAIST, Feb 2015 Research questions 1. Our goal is to set up an independent institution to evaluate and monitor all organizations’ cybersecurity level 2. Does information disclosure change organizational behaviour? In other words, spam reduce? • Method: Randomized field experiment • Two treatment groups with different info disclosure • Two cycles of emails at January/March 2014 • A website built on Google cloud 6
  • 7. Gene Moo Lee, KAIST, Feb 2015 Experimental design • 7919 US organizations, three groups: control, private, public • Private treatment: email with spam volume, rank, IP addr • Public treatment: email + publication in public website 7
  • 8. Gene Moo Lee, KAIST, Feb 2015 Randomization • Stratification with industry sectors and IP counts • Pair-wise matching with pre-experimental spam volume • Re-randomization: 10,000 times and power calculation 8
  • 9. Gene Moo Lee, KAIST, Feb 2015 Treatment channel: email 9
  • 10. Gene Moo Lee, KAIST, Feb 2015 Website: search engine 10 • http://cloud.spamrankings.net
  • 11. Gene Moo Lee, KAIST, Feb 2015 Website: overall stats 11
  • 12. Gene Moo Lee, KAIST, Feb 2015 Website: detail charts 12
  • 13. Gene Moo Lee, KAIST, Feb 2015 System implementation • Back end: data collector, peer ranker, web generator, MySQL, JSON • Front end: Google cloud, search engine, analytics 13
  • 14. Gene Moo Lee, KAIST, Feb 2015 Data: CBL and PSBL 14 • A spam blocklist uses spamtraps to collect IP adresses sending out spams: • CBL: http://cbl.abuseat.org/ • PSBL: http://psbl.org/ • Spamtrap • honeypot used to collect spam • email addresses not for legit communications • CBL daily avg data • 8 million IP, 190K netblocks, 21K ASNs, 200 countries
  • 15. Gene Moo Lee, KAIST, Feb 2015 Organizational spam data 15 • IP > netblock > ASN > organization • IP > netblock: IP lookup • netblock > ASN: Team Cymru • ASN > org: algorithm + manual inspection • Organization data from LexisNexis • 7919 U.S. organizations identified • Industry codes: SIC, NAICS • Public/private, # employees
  • 16. Gene Moo Lee, KAIST, Feb 2015 Org level spam volume and IP address 16
  • 17. Gene Moo Lee, KAIST, Feb 2015 Industry sectors 17
  • 18. Gene Moo Lee, KAIST, Feb 2015 Industry level spam volume/host 18
  • 19. Gene Moo Lee, KAIST, Feb 2015 Hypothesis development 1. Information disclosure effect 2. Publicity effect 3. Pre-experimental security level 4. Industry competition level 19
  • 20. Gene Moo Lee, KAIST, Feb 2015 Info sharing and publicity effects (H1, 2) 20
  • 21. Gene Moo Lee, KAIST, Feb 2015 Large spammers (H3) 21
  • 22. Gene Moo Lee, KAIST, Feb 2015 Competition (H4) 22
  • 23. Gene Moo Lee, KAIST, Feb 2015 Empirical analysis summary 1. Private info sharing doesn’t work 2. Publicity matters 3. Organizations with (1) large spam, (2) less competition reacted 4. Peer effect exists after the treatments. Stronger with treatment groups. 23
  • 24. Gene Moo Lee, KAIST, Feb 2015 Robustness check 1. Placebo test: change experiment time 2. Subsample analysis: only include moderate spammers 3. Alternative pre-experimental spam measure: 6, 4, 2, months 4. Control variables 24
  • 25. Gene Moo Lee, KAIST, Feb 2015 Directions 1. Robust security evaluation: spam, phishing, DDoS, etc. 2. Different environment: China, Korea 3. Treatment channel: social media 4. Cybersecurity insurance 5. Cloud security 25
  • 26. Gene Moo Lee, KAIST, Feb 2015 Thank you! Contact: gene@cs.utexas.edu 26
  • 27. Gene Moo Lee, KAIST, Feb 2015 References (1) [1] Adelsman, Rony M., and Andrew B. Whinston (1977). "Sophisticated voting with information for two voting functions." Journal of Economic Theory 15, no. 1: pp. 145-159. [2] Anderson, Axel, and Lones Smith. "Dynamic Deception." American Economic Review 103, no. 7 (2013): 2811-47. [3] Anderson, Ross (2001). "Why information security is hard: An economic perspective." IEEE Computer Security Applications Conference, pp. 358-365. [4] Aral, Sinan, and Dylan Walker. "Identifying influential and susceptible members of social networks." Science 337, no. 6092 (2012): pp. 337-341. [5] Arora, Ashish, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang (2004). "Impact of vulnerability disclosure and patch availability-an empirical analysis." Workshop on Economics of Information Security, vol. 24, pp. 1268-1287. [6] Bauer, Johannes, and Michael van Eeten (2009). “Cybersecurity: Stakeholder incentives, externalities, and policy options.” Telecommunications Policy, Vol. 33, pp. 706-719. [7] Blei, David M., Andrew Y. Ng, and Michael I. Jordan (2003). "Latent dirichlet allocation." Journal of Machine Learning Research 3: pp. 993-1022. [8] Bratko, Andrej, Gordon V. Cormack, Bogdan Filipic, Thomas R. Lynam, and Blaz Zupan (2006). Journal of Machine Learning Research 6: pp. 2673-2698. [9] Bruhn, Miriam, and David McKenzie (2008). "In pursuit of balance: Randomization in practice in development field experiments." World Bank Policy Research Working Paper Series. [10] Casey, Eoghan (2011). Digital evidence and computer crime: Forensic science, computers and the Internet. Academic Press. [11] Cormack, Gordon V., and Thomas R. Lynam (2007). “Online supervised spam filter evaluation.” ACM Transaction on Information Systems, Vol. 25(3) 27
  • 28. Gene Moo Lee, KAIST, Feb 2015 References (2) [12] D’Arcy, John, Anat Hovav, and Dennis Galletta (2009). "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach." Information Systems Research 20, no. 1: pp. 79-98. [13] Denning, Dorothy E. (1987). “An intrusion-detection model.” IEEE Transactions on Software Engineering, Vol. 13(2): pp. 222-232. [14] Dharmapurikar, Sarang, Praveen Krishnamurthy, and David E. Taylor (2003). “Longest prefix matching using bloom filters.” Proceedings of the ACM SIGCOMM Conference: pp. 201-212. [15] Dice, Lee R. (1945). “Measures of the amount of ecologic association between species.” Ecology 26(3): pp. 297-302. [16] Duflo, Esther, Rachel Glennerster, and Michael Kremer. "Using randomization in development economics research: A toolkit." Handbook of development economics 4 (2007): 3895-3962. [17] Fracassi, Cesare (2014). "Corporate finance policies and social networks." In AFA 2011 Denver Meetings Paper. [18] Festinger, Leon. "A theory of social comparison processes." Human relations 7, no. 2 (1954): 117-140. [19] Gal-Or, Esther, and Anindya Ghose (2005). "The economic incentives for sharing security information." Information Systems Research 16, no. 2: pp. 186-208. [20] Graham, Bryan S. (2008). "Identifying social interactions through conditional variance restrictions." Econometrica 76, no. 3: pp. 643-660. [21] Harper, Yan Chen, F. Maxwell, Joseph Konstan, and Sherry Xin Li. "Social comparisons and contributions to online communities: A field experiment on movielens." The American economic review (2010): 1358-1398. [22] Harrison, Glenn W., and John A. List (2004). "Field experiments." Journal of Economic Literature: pp. 1009-1055. [23] Kugler, Logan (2014). “Online Privacy: Regional Differences.” Communications of the ACM, Vol. 58 No. 2, pp. 18-20. 28
  • 29. Gene Moo Lee, KAIST, Feb 2015 References (3) [24] Krebs, Brian (2014). Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door. Sourcebooks, Inc. [25] Lee, Wenke, and Salvatore J. Stolfo (1998). “Data mining approaches for intrusion detection.” Proceedings of 7th USENIX Security Symposium. [26] Levchenko, Kirill, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage (2011). "Click Trajectories: End-to-End Analysis of the Spam Value Chain." IEEE Symposium on Security and Privacy. [27] Moore, Tyler and Richard Clayton (2011). "The Impact of Public Information on Phishing Attack and Defense." Communications & Strategies 81. [28] Morgan, Kari Lock, and Donald B. Rubin (2012). "Rerandomization to improve covariate balance in experiments." Annals of Statistics 40, no. 2: pp. 1263-1282. [29] Popadak, Jillian A. (2012). "Dividend Payments as a Response to Peer Influence." Available at SSRN 2170561, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2170561. [30] Pitsillidis, Andreas, Chris Kanich, Geoffrey M Voelker, Kirill Levchenko, Stefan Savage (2012). “Taster’s choice: A comparative analysis of spam feeds.” Proceedings of the 2012 ACM Internet Meassure Conference: pp. 427-440. [31] Rao, Justin M., and David H. Reiley (2012). "The economics of spam." Journal of Economic Perspectives 26, no. 3: pp. 87-110. [32] Roesch, Martin (1999). “SNORT: Lightweight intrusion detection for networks.” Proceedings of 13th Large Installation System Administration Conference, pp. 229-238. [33] Rothschild, Michael, and Joseph Stiglitz (1992). “Equilibrium in competitive insurance markets: An essay on the economics of imperfect information.” Springer Netherlands. [34] Sahami, Mehran, Susan Dumais, David Heckerman, and Eric Horvitz (1998). “A Bayesian approach to filtering junk e-mail.” Learning for Text Categorization 62: pp. 98-105. 29
  • 30. Gene Moo Lee, KAIST, Feb 2015 References (4) [35] Shue, Kelly (2013). "Executive networks and firm policies: Evidence from the random assignment of MBA peers." Review of Financial Studies 26, no. 6: pp. 1401-1442. [36] Tang, Qian, Leigh Linden, John S. Quarterman, and Andrew B. Whinston (2013). “Improving Internet security through social information and social comparison: A field quasi-experiment.” In Workshop on the Economics of Information Security. [37] Taylor, Robert W., Eric J. Fritsch, and John Liederbach (2014). Digital crime and digital terrorism. Prentice Hall Press. [38] Taylor, Shelley E., and Marci Lobel (1989). "Social comparison activity under threat: downward evaluation and upward contacts." Psychological review 96, no. 4: p. 569. [39] van Eeten, M., H. Asghari, J. M. Bauer, and S. Tabatabaie (2011). "Internet service providers and botnet mitigation: A fact-finding study on the Dutch market." Delft University of Technology. [40] Wood, Dallas, and Brent Rowe (2011). "Assessing home Internet users’ demand for security: Will they pay ISPs?" Workshop of Economics of Information Security. 30