200 likes | 331 Views
Cyber-crime Science. Pieter Hartel. The Course. Goals Study cybercrime from a social perspective Organisation Teams of three Do an experiment Write a paper Review other papers Present the paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/. Team. Lecturers
E N D
Cyber-crime Science Pieter Hartel
The Course • Goals • Study cybercrime from a social perspective • Organisation • Teams of three • Do an experiment • Write a paper • Review other papers • Present the paper at a conference • http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science
Team • Lecturers • Pieter Hartel (course organisation, computer science) • Marianne Junger (social science) • Teaching assistants • Lorena Montoya • Jan Willem Bullée • Elmer Lastdrager • Inés CarvaljalGallardo Cyber-crime Science
Contents • Theory • What is Crime and Cyber-crime? • Technology (ICT) creates opportunity • Crime Science • Opportunity reduction works • Practice • How to do an opportunity reducing experiment in this course? Cyber-crime Science
Crime and Cyber-crime • Crime • Behaviour commonly considered harmful, serious • Disorder • Lack of order, broader than crime • Cyber-crime • ICT used as a tool, target or place [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science
Porn on video billboard Cyber-crime Science
Cyber-crime is big business [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science
ICT creates opportunity • Offenders know that they run little risk • Targets often don’t understand the risks Cyber-crime Science
Crime Science • Five principles of opportunity reduction • Increase effort • Increase risks • Reduce rewards • Reduce provocation • Remove excuses • Measure the effect of the intervention Cyber-crime Science
Opportunity reduction works Clicked on link (%) [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 10 Cyber-crime Science
Practice Cyber-crime Science
Question • Is an intervention as coursework feasible? • Yes, but it’s hard work • … and it can be a lot of fun • Check out what 43 teams have done in previous years [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science
Interactive trash cans, N=24 Cyber-crime Science
Social Sports leak, N=308 [Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports networks as crime facilitators. Crime Science, 3:Article 8, 2014. http://dx.doi.org/10.1186/s40163-014-0008-z. Cyber-crime Science
Course Schedule PII form Ethical committee team+ topic Draft research proposal Final proposal & slide (5 weeks) APA paper writing Present ideas Present again Experiment & draft paper (9 weeks) Research Methods Reviewing final paper review & slides (6 weeks) Presentations Cyber-crime Science
Help is at hand • What? • Clinics: get feedback or discuss • F2F in Enschede or via Skype • When? • Sign up via the doodle to get a 20-minute timeslot • 12 and 19 September, 3 October and more • More details on website Cyber-crime Science
Examination • By coursework only • Quality of the paper • Quality of the reviews • Quality of the presentations • You will be marked by your peers • And you may not like it… • But the lecturers and TAs are the moderators Cyber-crime Science
FAQ • Team topic (week 1) • What is the crime/disorder and how will you prevent it? • Draft proposal (week 3) • What are the risks for the researchers and the subjects? • What is the control group? • Final draft proposal (week 5) • Does my design work? Do a pilot! • Draft paper (week 14) • Can someone else repeat the experiment? • Final paper (week 18) • Are the results statistically significant? Cyber-crime Science
What to do next? • Sign up via the site • Complete and sign the PII form now • Social science training : 0.5 bonus point • Write 1 A4 Research proposal with: • Background • Method • Three key references • Appendix: Checklist Ethical Committee • For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science
Project ideas • Elmer (e.e.h.lastdrager@utwente.nl) • Phishing on Facebook • Phishing puzzles • Lorena (a.l.montoya@utwente.nl) • Socio-physical differences in the compliance to a request to surrender credentials • Jan-Willem (j.h.bullee@utwente.nl) • Social engineering for software updates • Dynamic digital interventions Cyber-crime Science