Introduction

advertisement
Cyber-crime Science
Pieter Hartel
The Course
 Goals
» Study cybercrime from a social perspective
 Organisation
» Teams of three
» Do an experiment
» Write a paper
» Review other papers
» Present the paper at a conference
 http://www.ewi.utwente.nl/~pieter/CCS/
2
Cyber-crime Science
Team
 Lecturers
» Pieter Hartel (course organisation, computer science)
» Marianne Junger (social science)
 Teaching assistants
» Lorena Montoya
» Jan Willem Bullée
» Elmer Lastdrager
» Inés Carvaljal Gallardo
3
Cyber-crime Science
Contents
 Theory
» What is Crime and Cyber-crime?
» Technology (ICT) creates opportunity
» Crime Science
» Opportunity reduction works
 Practice
» How to do an opportunity reducing experiment in this
course?
4
Cyber-crime Science
Crime and Cyber-crime
 Crime
» Behaviour commonly considered harmful, serious
 Disorder
» Lack of order, broader than crime
 Cyber-crime
» ICT used as a tool, target or place
[New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime
and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25
5
Cyber-crime Science
Porn on video billboard
6
Cyber-crime Science
Cyber-crime is big business
Estimate (B$)
Year
Anti-virus
3.4
2012
Patching
1
2010
ISP clean-up
0.04
2010
User clean-up
10
2012
Defence firms
10
2010
Law enforcement
0.4
2010
[And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T.
Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the
Economics of Information Security (WEIS), Berlin, Germany, Jun 2012.
http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
7
Cyber-crime Science
ICT creates opportunity
 Offenders know that they run little risk
 Targets often don’t understand the risks
8
Cyber-crime Science
Crime Science
 Five principles of opportunity reduction
1. Increase effort
2. Increase risks
3. Reduce rewards
4. Reduce provocation
5. Remove excuses
 Measure the effect of the intervention
9
Cyber-crime Science
Opportunity reduction works
Clicked
on link
(%)
[Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham.
School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy
and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM.
http://dx.doi.org/10.1145/1572532.1572536
10
Cyber-crime Science
10
Practice
11
Cyber-crime Science
Question
 Is an intervention as coursework feasible?
» Yes, but it’s hard work
» … and it can be a lot of fun
 Check out what 43 teams have done in
previous years
[Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical
Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012.
http://eprints.eemcs.utwente.nl/22066/
12
Cyber-crime Science
Interactive trash cans, N=24
13
Cyber-crime Science
Social Sports leak, N=308
[Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports
networks as crime facilitators. Crime Science, 3:Article 8, 2014.
http://dx.doi.org/10.1186/s40163-014-0008-z.
14
Cyber-crime Science
Course Schedule
PII form
team+
topic
Ethical committee
Draft
research
proposal
Final
proposal &
slide
Present ideas
(5 weeks)
APA paper writing
Present again
(9 weeks)
Experiment & draft paper
Research Methods
final paper
Reviewing
review &
slides
(6 weeks)
Presentations
15
Cyber-crime Science
Help is at hand
 What?
» Clinics: get feedback or discuss
» F2F in Enschede or via Skype
 When?
» Sign up via the doodle to get a 20-minute timeslot
» 12 and 19 September, 3 October and more
 More details on website
16
Cyber-crime Science
Examination
 By coursework only
» Quality of the paper
» Quality of the reviews
» Quality of the presentations
 You will be marked by your peers
» And you may not like it…
» But the lecturers and TAs are the moderators
17
Cyber-crime Science
FAQ
 Team topic (week 1)
» What is the crime/disorder and how will you prevent it?
 Draft proposal (week 3)
» What are the risks for the researchers and the subjects?
» What is the control group?
 Final draft proposal (week 5)
» Does my design work? Do a pilot!
 Draft paper (week 14)
» Can someone else repeat the experiment?
 Final paper (week 18)
» Are the results statistically significant?
18
Cyber-crime Science
What to do next?
1. Sign up via the site
2. Complete and sign the PII form now
3. Social science training : 0.5 bonus point
4. Write 1 A4 Research proposal with:
» Background
» Method
» Three key references
» Appendix: Checklist Ethical Committee
5. For the forms and deadlines see:
http://www.ewi.utwente.nl/~pieter/CCS/
19
Cyber-crime Science
Project ideas
 Elmer (e.e.h.lastdrager@utwente.nl)
» Phishing on Facebook
» Phishing puzzles
 Lorena (a.l.montoya@utwente.nl)
» Socio-physical differences in the compliance to a
request to surrender credentials
 Jan-Willem (j.h.bullee@utwente.nl)
» Social engineering for software updates
» Dynamic digital interventions
20
Cyber-crime Science
Download