210 likes | 340 Views
Cyber-crime Science. Pieter Hartel Elmer Lastdrager. The Course. Goals Study cybercrime from a social perspective Organisation Teams of 2-3 Do an experiment Write a paper Review each other’s papers Present your paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/. Team.
E N D
Cyber-crime Science Pieter Hartel Elmer Lastdrager
The Course • Goals • Study cybercrime from a social perspective • Organisation • Teams of 2-3 • Do an experiment • Write a paper • Review each other’s papers • Present your paper at a conference • http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science
Team • Lecturers • Pieter Hartel (course organisation, computer science) • Marianne Junger (social science) • Teaching assistants • Lorena Montoya • Jan Willem Bullée • Elmer Lastdrager • Wilbert Rodenhuis Cyber-crime Science
Contents • Theory • What is Crime and Cyber-crime? • Technology (ICT) creates opportunity • Crime Science • Opportunity reduction works • Practice • How to do an opportunity reducing experiment in this course? Cyber-crime Science
Crime and Cyber-crime • Crime • Behaviour commonly considered harmful, serious • Law • Disorder • Lack of order, broader than crime • Cyber-crime • ICT used as a tool, target or place [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science
Porn on video billboard Cyber-crime Science
Cyber-crime is big business [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science
ICT creates opportunity • Offenders know that they run little risk • Targets often don’t understand the risks Cyber-crime Science
Crime Science • Five principles of opportunity reduction • Increase effort • Increase risks • Reduce rewards • Reduce provocation • Remove excuses • Measure the effect of the intervention Cyber-crime Science
Opportunity reduction works Clicked on link (%) [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 10 Cyber-crime Science
Practice Cyber-crime Science
Question • Is an intervention as coursework feasible? • Yes, but it’s hard work • … and it can be a lot of fun [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science
Simulated ID theft, N=100 Cyber-crime Science
Interactive trash cans, N=24 Cyber-crime Science
Social Sports leak, N=308 Cyber-crime Science
Course Schedule PII form Ethical committee team+ topic Draft research proposal Final proposal & slide (5 weeks) APA paper writing Present ideas Present again Experiment & draft paper (9 weeks) Research Methods Reviewing final paper review & slides (6 weeks) Presentations Cyber-crime Science
Help is at hand • What? • Clinics: get feedback or discuss • Optional, in Enschede • Sign up via the doodle to get a 20-minute timeslot • When? • 25 September 9am - noon (draft proposal) • 9 October 9am - noon (EC, final proposal) • After 22 October on request wed morning (e.g. statistics) • More? • More details on website • Non-UT students: mail / Skype with TA’s Cyber-crime Science
Examination • By coursework only • Team of two or three writes a six page paper • Results on the basis of data collected by team • Peer r eview by students and the lecturers • Mini conference with presenter chosen at the last minute • You will be marked by your peers • And you will not like it… • But the lecturers are the moderators Cyber-crime Science
FAQ • Team topic (week 1) • What is the crime/disorder and how will you prevent it? • Draft proposal (week 3) • What are the risks for the researchers and the subjects? • What is the control group? • Final draft proposal (week 5) • Does my design work? Do a pilot! • Draft paper (week 14) • Can someone else repeat the experiment? • Final paper (week 18) • Are the results statistically significant? Cyber-crime Science
What to do next? • Complete and sign the PII form now • Socialengineering training : 0.5 bonus point • Write 1 A4 Research proposal with: • Background • Method • Three key references • Appendix: Checklist Ethical Committee • For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ • Go to the TAs if you need help Cyber-crime Science