SlideShare uma empresa Scribd logo
1 de 36
#RSAC
Bikash BaraiUsing Behavioral Psychology and
Science of Habit to Change User
Behavior
Co-founder (Cigital India)
@bikashbarai1
#RSAC
Is Awareness Enough To Change
Human Behavior?
2
#RSAC
3
Credit: Abd Allah Foteih
#RSAC
Awareness vs Change Of Behavior
4
Example: Continued security training beyond the baseline are unlikely to be effective -
“Modifying Smartphone User Locking Behavior” – by Dirk et al (ACM – 2013)
Awareness
ChangeinBehavior
#RSAC
What Else Do We Need?
5
#RSAC
The Mystery of Eugene Pauly’s Brain ..
6
Dr. Lary R. Squire
University of California, San Diego
Image Source: http://whoville.ucsd.edu/about.html
#RSAC
Goal Directed System (Pre-Frontal Cortex)
Responsible for new or infrequent
behaviors
Guided by attitudes, goals, values,
knowledge
Conscious and deliberate
Slow
Habit System (Basal Ganglia)
Very fast. Does not require thought or
attention
Less conscious. More automatic
Goal Directed and Habit System
7
Credit: Neal et al – The Science of Habit…
#RSAC
40% of our daily actions are driven without thinking
Examples of Habits in action
Changing gears
Getting out of elevator in wrong floor
Tying Shoe knots
Bad habits in action
Checking phone/blackberry during the middle of sleep
Clicking phishing links
Writing down passwords in open
Habits in Action..
8
#RSAC
How To Build A New Habit?
9
#RSAC
Story of Pepsodent ..
10
https://upload.wikimedia.org/wikipedia/en/8/88/Pepsodent-0179c.jpg
#RSAC
Trigger – Routine – Reward ( & Craving )
11
Trigger:
Feel Tooth Film with
tongue
Routine:
Brushing Teeth
Reward:
Great Smile
Crave for
Tingling
Image Credit: Seth LemmonsImage Credit: Wikipediahttps://i.ytimg.com/vi/rf1Bs2XpwFI/maxresdefault.jpg
#RSAC
Step 1: Find a Predictable and Recurring Trigger
Step 2: Devise the new Routine/Habit
Step 3: Find the Reward
Practice, Practice, Practice without exceptions
Steps for Building New Habits
12
#RSAC
How To Change A Habit?
13
#RSAC
14
Old Habits
Never Die
#RSAC
Example – Changing A Habit
15
Trigger:
Boredom
Routine:
Have a Whisky
Reward:
Feel Happy
Image Credit: Wiki
#RSAC
Example – Changing A Habit
16
Trigger:
Boredom
New Routine:
Talk to a friend
Reward:
Feel Happy
Image Credit: Wiki
#RSAC
3 Steps for Changing Old Habits
Identify and Deconstruct the Habit
Find the Trigger
Find the “real hidden reward” – Experiment to discover
Find the Trigger-Routine-Reward-Craving model
Find an alternative routine to satisfy the “real hidden reward”
Practice. Practice. Practice.
#RSAC
“Hard Thing” about “Easy Things”..
18
#RSAC
Understanding Buffer Overflow - Easy
19
Finding A vulnerability - Hard
Writing A “Reliable” Exploit- Very Hard
#RSAC
Several “toothpaste” companies went bankrupt
Coke, McDonalds campaigns..
What is hard about it?
Finding a “Reliable” trigger and reward
Creating craving and making it stick
Hard or Easy?
20
#RSAC
Applying The Science Of Habit
21
In Information Security & Life..
#RSAC
Example 1: Create Habit of Locking Computer
Screen..
Goal: Locking system while leaving desk
Trigger – Getting up from chair/Leaving the system
Routine – Lock your computer
Reward – Feeling of security
Rehearse or Repeat at least 20 times
If you forget then go back to seat and repeat the routine
#RSAC
Example 2 – Change the Habit of Writing Down
Password in Open Areas
Goal: Stop the habit of writing down password areas
Trigger – New password setting request
Old Routine – write down the password
New Routine – “write down the clue” or “Use a Scheme to generate new
passwords”
Reward – Feeling of security
Rehearse or Repeat
#RSAC
Example 3: Preventing Phishing
Old Habit
Trigger: Legitimate entity asks for personal details
Routine: Share the details
New Desired Habit
Trigger: Legitimate entity asks for personal details
New Routine: Validate the legitimacy of the entity
Practice. Practice. Practice
24
#RSAC
Example 4- Create Secure Coding Behavior
Goal – Ensuring coders use secure coding functions
Trigger – Typing a function
Old Routine – Type insecure function
New Routine – Use intervention method to prompt secure function
Enough practice
Automatic use of secure function
#RSAC
Habits in Day to Day Life..
Playing/Exercise everyday
Controlling anger outbursts..
#RSAC
Current State of Research
27
#RSAC
Research on Habits and Beyond..
Research on Habits
Significant studies in the field of psychology, marketing, sports etc
Little or No research in areas related to IT security
28
#RSAC
References and Other Studies ..
Balleine et al – Goal directed instrumental action: contingency and incentive learning and their cortical
substrates
Kahneman – Thinking fast and slow
Duhigg- The power of habit
Neal et al – The pull of the past when do habits persist despite conflict with motives?
Rothman et al- Reflective and automotive processes in the initiation and maintenance of dietary change
Sheeran et al – Implementation intentions and repeated behavior..
Wood et al – A new look at habits and habit- goal interface
Wood et al- The habitual consumer
Wood et al- Habits in everyday life: thought emotion and action
29
#RSAC
Apply What You Learned..
30
#RSAC
Apply What You Learned
Next Week
Choose 1 habit that you want to change or build
Identify a small group for experiment
Experiment
First 3 months
Find the most important habits to change in your organization
Create an organization wide plan for habit change drills
Make people practice at least 20 to 30 times in a short time frame. (Group
activities, Simulation exercise, Wargames etc)
Measure the success of the program
#RSAC
After 6 months
Assess the success of the program based on the metrics defined
Reassess the risky and secure behavior and create a new program
32
#RSAC
Awareness Is Not Enough
33
Invest In Forming Lasting Habits
#RSAC
Practice Does Not Make Perfect
34
“Perfect Practice” Makes Perfect
#RSAC
Want To Engineer A Habit?
35
Let’s Meet At The Bar ..
#RSAC
Questions please..
bbarai@cigital.com
@bikashbarai1
36
Bikash Barai

Mais conteúdo relacionado

Destaque

Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityPriyanka Aash
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisPriyanka Aash
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorPhu H. Nguyen
 
Workshop on Endpoint Memory Forensics
Workshop on Endpoint Memory ForensicsWorkshop on Endpoint Memory Forensics
Workshop on Endpoint Memory ForensicsPriyanka Aash
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingPriyanka Aash
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)vanisre jaiswal
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data Driven Innovation
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015Patrick Kalaher
 
(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1Serhii Havrylov
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD IntroductionWayne Sun
 

Destaque (20)

Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sector
 
Workshop on Endpoint Memory Forensics
Workshop on Endpoint Memory ForensicsWorkshop on Endpoint Memory Forensics
Workshop on Endpoint Memory Forensics
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
7 Myths of AI
7 Myths of AI7 Myths of AI
7 Myths of AI
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015frog IoT Big Design IoT World Congress 2015
frog IoT Big Design IoT World Congress 2015
 
Senzations’15: Secure Internet of Things
Senzations’15: Secure Internet of ThingsSenzations’15: Secure Internet of Things
Senzations’15: Secure Internet of Things
 
(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1(Kpi summer school 2015) theano tutorial part1
(Kpi summer school 2015) theano tutorial part1
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD Introduction
 

Semelhante a Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior

Using Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User BehaviorUsing Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User BehaviorPriyanka Aash
 
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback VerbicQualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback VerbicNorthpoint Centre of Learning
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceNUS-ISS
 
Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011uchitha bandara
 
Add creativity to your decision process
Add creativity to your decision processAdd creativity to your decision process
Add creativity to your decision processSiddharth Kumar Kadamb
 
APF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 finalAPF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 finalMike Courtney
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventMike Cardus
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine WindowsMike Cardus
 
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision FiltersKanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision FiltersLeanKanbanIndia
 
How to build a superstar self-organizing team?
How to build a superstar self-organizing team?How to build a superstar self-organizing team?
How to build a superstar self-organizing team?Oleksandr Lutsaievskyi
 
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and DesignPRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and DesignPurple, Rock, Scissors
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Angus Carbarns
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data PracticesAtif Shaikh
 
Hilda taba’s inductive thinking model
Hilda taba’s inductive thinking modelHilda taba’s inductive thinking model
Hilda taba’s inductive thinking modelsudha pandeya/pathak
 
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...Hassan Usman
 
Shaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - IntroductionShaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - IntroductionKerry Richardson
 
Creativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming CompetenciesCreativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming CompetenciesHerrmann International
 

Semelhante a Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior (20)

Using Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User BehaviorUsing Behavioral Psychology and Science of Habit to Change User Behavior
Using Behavioral Psychology and Science of Habit to Change User Behavior
 
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback VerbicQualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
Qualitative Research Session with Piyul Mukherjee & Pia Mollback Verbic
 
From Human Intelligence to Machine Intelligence
From Human Intelligence to Machine IntelligenceFrom Human Intelligence to Machine Intelligence
From Human Intelligence to Machine Intelligence
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Ch14
Ch14Ch14
Ch14
 
Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011Requirement_and_Discovery_JUNE_2011
Requirement_and_Discovery_JUNE_2011
 
Baworld adapting to whats happening
Baworld adapting to whats happeningBaworld adapting to whats happening
Baworld adapting to whats happening
 
Add creativity to your decision process
Add creativity to your decision processAdd creativity to your decision process
Add creativity to your decision process
 
APF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 finalAPF orlando diy survey workshop 071114 final
APF orlando diy survey workshop 071114 final
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First Event
 
Enabling Innovation Nine Windows
Enabling Innovation Nine WindowsEnabling Innovation Nine Windows
Enabling Innovation Nine Windows
 
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision FiltersKanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
Kanban India 2022 | Badre Srinivasan | Culture Hack# - Decision Filters
 
How to build a superstar self-organizing team?
How to build a superstar self-organizing team?How to build a superstar self-organizing team?
How to build a superstar self-organizing team?
 
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and DesignPRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
PRPL @ SXSW: The Symbiosis of Brains, Marketing, and Design
 
Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...Perfectly Irrational: the importance of psychological validity in market rese...
Perfectly Irrational: the importance of psychological validity in market rese...
 
Agile Big Data Practices
Agile Big Data PracticesAgile Big Data Practices
Agile Big Data Practices
 
Hilda taba’s inductive thinking model
Hilda taba’s inductive thinking modelHilda taba’s inductive thinking model
Hilda taba’s inductive thinking model
 
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
Chapter 1 - Research Methods for Business By Authors Uma Sekaran and Roger Bo...
 
Shaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - IntroductionShaping Tomorrow - Getting Started - Introduction
Shaping Tomorrow - Getting Started - Introduction
 
Creativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming CompetenciesCreativity and Strategic Thinking: The Coming Competencies
Creativity and Strategic Thinking: The Coming Competencies
 

Mais de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Mais de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Keynote Session : Using Behavioral Psychology and Science of Habit to Change User Behavior

  • 1. #RSAC Bikash BaraiUsing Behavioral Psychology and Science of Habit to Change User Behavior Co-founder (Cigital India) @bikashbarai1
  • 2. #RSAC Is Awareness Enough To Change Human Behavior? 2
  • 4. #RSAC Awareness vs Change Of Behavior 4 Example: Continued security training beyond the baseline are unlikely to be effective - “Modifying Smartphone User Locking Behavior” – by Dirk et al (ACM – 2013) Awareness ChangeinBehavior
  • 5. #RSAC What Else Do We Need? 5
  • 6. #RSAC The Mystery of Eugene Pauly’s Brain .. 6 Dr. Lary R. Squire University of California, San Diego Image Source: http://whoville.ucsd.edu/about.html
  • 7. #RSAC Goal Directed System (Pre-Frontal Cortex) Responsible for new or infrequent behaviors Guided by attitudes, goals, values, knowledge Conscious and deliberate Slow Habit System (Basal Ganglia) Very fast. Does not require thought or attention Less conscious. More automatic Goal Directed and Habit System 7 Credit: Neal et al – The Science of Habit…
  • 8. #RSAC 40% of our daily actions are driven without thinking Examples of Habits in action Changing gears Getting out of elevator in wrong floor Tying Shoe knots Bad habits in action Checking phone/blackberry during the middle of sleep Clicking phishing links Writing down passwords in open Habits in Action.. 8
  • 9. #RSAC How To Build A New Habit? 9
  • 10. #RSAC Story of Pepsodent .. 10 https://upload.wikimedia.org/wikipedia/en/8/88/Pepsodent-0179c.jpg
  • 11. #RSAC Trigger – Routine – Reward ( & Craving ) 11 Trigger: Feel Tooth Film with tongue Routine: Brushing Teeth Reward: Great Smile Crave for Tingling Image Credit: Seth LemmonsImage Credit: Wikipediahttps://i.ytimg.com/vi/rf1Bs2XpwFI/maxresdefault.jpg
  • 12. #RSAC Step 1: Find a Predictable and Recurring Trigger Step 2: Devise the new Routine/Habit Step 3: Find the Reward Practice, Practice, Practice without exceptions Steps for Building New Habits 12
  • 13. #RSAC How To Change A Habit? 13
  • 15. #RSAC Example – Changing A Habit 15 Trigger: Boredom Routine: Have a Whisky Reward: Feel Happy Image Credit: Wiki
  • 16. #RSAC Example – Changing A Habit 16 Trigger: Boredom New Routine: Talk to a friend Reward: Feel Happy Image Credit: Wiki
  • 17. #RSAC 3 Steps for Changing Old Habits Identify and Deconstruct the Habit Find the Trigger Find the “real hidden reward” – Experiment to discover Find the Trigger-Routine-Reward-Craving model Find an alternative routine to satisfy the “real hidden reward” Practice. Practice. Practice.
  • 18. #RSAC “Hard Thing” about “Easy Things”.. 18
  • 19. #RSAC Understanding Buffer Overflow - Easy 19 Finding A vulnerability - Hard Writing A “Reliable” Exploit- Very Hard
  • 20. #RSAC Several “toothpaste” companies went bankrupt Coke, McDonalds campaigns.. What is hard about it? Finding a “Reliable” trigger and reward Creating craving and making it stick Hard or Easy? 20
  • 21. #RSAC Applying The Science Of Habit 21 In Information Security & Life..
  • 22. #RSAC Example 1: Create Habit of Locking Computer Screen.. Goal: Locking system while leaving desk Trigger – Getting up from chair/Leaving the system Routine – Lock your computer Reward – Feeling of security Rehearse or Repeat at least 20 times If you forget then go back to seat and repeat the routine
  • 23. #RSAC Example 2 – Change the Habit of Writing Down Password in Open Areas Goal: Stop the habit of writing down password areas Trigger – New password setting request Old Routine – write down the password New Routine – “write down the clue” or “Use a Scheme to generate new passwords” Reward – Feeling of security Rehearse or Repeat
  • 24. #RSAC Example 3: Preventing Phishing Old Habit Trigger: Legitimate entity asks for personal details Routine: Share the details New Desired Habit Trigger: Legitimate entity asks for personal details New Routine: Validate the legitimacy of the entity Practice. Practice. Practice 24
  • 25. #RSAC Example 4- Create Secure Coding Behavior Goal – Ensuring coders use secure coding functions Trigger – Typing a function Old Routine – Type insecure function New Routine – Use intervention method to prompt secure function Enough practice Automatic use of secure function
  • 26. #RSAC Habits in Day to Day Life.. Playing/Exercise everyday Controlling anger outbursts..
  • 27. #RSAC Current State of Research 27
  • 28. #RSAC Research on Habits and Beyond.. Research on Habits Significant studies in the field of psychology, marketing, sports etc Little or No research in areas related to IT security 28
  • 29. #RSAC References and Other Studies .. Balleine et al – Goal directed instrumental action: contingency and incentive learning and their cortical substrates Kahneman – Thinking fast and slow Duhigg- The power of habit Neal et al – The pull of the past when do habits persist despite conflict with motives? Rothman et al- Reflective and automotive processes in the initiation and maintenance of dietary change Sheeran et al – Implementation intentions and repeated behavior.. Wood et al – A new look at habits and habit- goal interface Wood et al- The habitual consumer Wood et al- Habits in everyday life: thought emotion and action 29
  • 30. #RSAC Apply What You Learned.. 30
  • 31. #RSAC Apply What You Learned Next Week Choose 1 habit that you want to change or build Identify a small group for experiment Experiment First 3 months Find the most important habits to change in your organization Create an organization wide plan for habit change drills Make people practice at least 20 to 30 times in a short time frame. (Group activities, Simulation exercise, Wargames etc) Measure the success of the program
  • 32. #RSAC After 6 months Assess the success of the program based on the metrics defined Reassess the risky and secure behavior and create a new program 32
  • 33. #RSAC Awareness Is Not Enough 33 Invest In Forming Lasting Habits
  • 34. #RSAC Practice Does Not Make Perfect 34 “Perfect Practice” Makes Perfect
  • 35. #RSAC Want To Engineer A Habit? 35 Let’s Meet At The Bar ..

Notas do Editor

  1. Eugene Pauly’s part of the brain is destroyed due to viral encephalitis and left him with no short term memory. He moved to a new neighborhood and his wife used to take her for a walk everyday at a fixed time. Amazingly one day when his wife was late he went out for walk himself and returned back though he did not remember the way. He could not tell where the refrigerator was located if asked but if hungry he could automatically go there and take out a jar or nuts. The scientists were baffled how could somebody reach the refrigerator or traverse a path automatically without rememberring it’s whereabouts.
  2. In early 1900 only 7% of the American were brushing teeth. Most of the toothpaste companies failed to market the toothpaste despite poor dental hygiene of the entire country. Claude Hopkins (creator of quaker oat, goodyear tires campaign.. Made so much money.. That he devotred..) formula – quaker oats works only if you have one bowl every morning.. Drink a tonic at the first symptom of fatigue created a clever campaign which revolutionized the brush habits in America and moved it to 65%. How it worked? He used Habit Cycle – He found that there is a film which deposits on teeth. It occurs no matter how often you brush. But he cleverly used this as a Cue and created the above campaign to drive the brushing habit as a trigger. He used great smile and good hygiene as the reward.
  3. However, after a while scientists later discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same. Similar strategy has been used in marketing Febreze and multiple other products. Craving creates urge to get the reward. It helps a habit to stick.. Urge for nicotin, urge for the fatty food, urge for the smell, urge for feeling fresh/craving for endorphin rush after exercise
  4. However, after a while scientists discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same.
  5. However, after a while scientists discovered that there was something beyond the Cue, Routine and Reward. Pepsodent created a cool tingling sensation after brushing. This tingling strated creating “craving”. So every time somebody felt the dental film there is a craving of freshness and tingling sensation which started driving change in behavior. Eventually every toothpaste started doing the same.
  6. Will recreate the graphics to make it clear
  7. Will improve upon the look and feel of this slide