‘The CyberPsychology of Cyber Security’ World Cyber Security Technology Research Summit 2014 Mary Aiken Director RCSI CyberPsychology Research Centre Fellow.

Slides:



Advertisements
Similar presentations
Computational Models of Musical Creativity Anna Jordanous DPhil Research Music Informatics Research Centre, Department of Informatics University.
Advertisements

Aaron Summers. What is Artificial Intelligence (AI)? Great question right?
Making the link between the principles of effective leadership and mediation skills? Claire Maxwell Degree Programme Director/ Clinical Senior Lecturer.
CyberPsychology Research Centre DS – 1 – 2014 Privacy (Partner) Mary Aiken & Ciarán Mc Mahon RCSI Royal College of Surgeons in Ireland Coláiste Ríoga na.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
ORGANISATIONS AND BEHAVIOUR
MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Definitions  eBusiness The use of computer based information systems for the management and coordination.
Sami Gülgöz Koç University EU 7th FRAMEWORK PROGRAMME ERC INFODAY 1 March 2010, Bogazici University, Istanbul.
Leadership theory – a psychological perspective Early models Personality Organizational aspects Transformational/developmental leadership Indirect leadership.
ISACA Research Update Robert Foster Research Director, ISACA Northern England Chapter.
Cloud Usability Framework
The College of Information Sciences and Technology ist.psu.edu.
Real borders and virtual borders. An approach to Spanish scene Antonio García Jiménez Communication Across Borders Conference IDC Herzliya. Israel July,
Presented by Yeshwanth Boppana Sowmya Nagubadi. overview Introduction SL and WOW Virtual Laboratory Experiments Observational Social and Economic Science.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Research at Department of Computer and Systems Sciences – DSV.
Cyberpsychology: An Introduction to Human-Computer Interaction
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Innovations in distance and e-learning: options and bottlenecks Dr András Szűcs Secretary General, European Distance and E-Learning Network Director, Center.
Organizational Trust Model Based on Business Students’ Opinions Adrian Sonea Petru Maior University, Ovidiu-Niculae.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Slide # 1 Experimental Psychology. Slide # 2 Special Areas in Psychology Experimental Clinical Counseling School Emotional Developmental Personality Social.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
WELCOME TO THETOPPERSWAY.COM.
Leadership. Leadership andManagement Langton, Robbins and Judge, Organizational Behaviour, Fifth Cdn. Ed. Copyright © 2010 Pearson Education Canada.
The Behavioral Sciences.  Behavioural science (or Behavioral science) is a term that encompasses all the disciplines that explore the activities of and.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
DECONSTRUCTING THE USER: INFORMATION SHARING AND MANAGING IDENTITY I203 Social and Organizational Issues of Information.
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
IGCSE Global Perspectives
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
“Cyber-securing the Human” CSIT 2015 Mary Aiken: Director RCSI CyberPsychology Research Centre.
New Rules, Cool Tools 2009 State Leaders Summer Conference Don Blake, NEA PR State Relations.
WHAT IS THE SAME THING BETWEEN THEM??  Leading people  Influencing people  Commanding people  Guiding people  Leadership is the influencing process.
FFIEC Cyber Security Assessment Tool
The Nature of Leadership A new perspective on the science of leadership.
Patricia B. Licuanan, Ph.D. Chairperson Commission on Higher Education.
Computer Science and Engineering 1 Mobile Computing and Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Human Factors in Cyber Security: A Review for Research & Education P. Vigneswara Ilavarasan, PhD 1.
Leadership chapter fourteen Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Leadership in Higher Education: Thoughts and Reflections Adrianna Kezar Associate professor University of Southern California.
Connect with me on Linkedin.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
THE core elements of digital citizenship
Patricia B. Licuanan, Ph.D. Chairperson Commission on Higher Education
ISO’s standardization approach to security, privacy and trust
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Cornelia Kutterer Director Digital Policy Microsoft.
Preparing for the Cognitive Generation of Decision Support
Unit 650: Understand professional management and leadership in health and social care settings Key learning points Unit 650 (LM 507): Understand professional.
Dr Linda K Kaye 20th Understanding the role of social contexts and experiences in digital gaming Dr Linda K Kaye.
A BIG DATA WORLD Smaller and smaller and smarter devices
Unit 12 Organizational Behaviour Unit 12 Organizational Behaviour Aim The aim of this unit is to develop a student's understanding of the influence culture,
Trends in my profession, Information Technology
Consulting Services for IoT
Information Science in International Perspective
The Practical Side of Meaningful Use:
JPL Perspective on Software Defined Everything
Information technologies/NBIC and Big data
Make it easy to be secure E.g. derived credentials test lab
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
GRC, A holistic Road Map for Information Security Transformation
The Evolving Role Of Medical Affairs (MA)
Chapter 9 Authentic Leadership
Presentation transcript:

‘The CyberPsychology of Cyber Security’ World Cyber Security Technology Research Summit 2014 Mary Aiken Director RCSI CyberPsychology Research Centre Fellow RCSI Institute of Leadership Research Fellow School of Law Middlesex University Fellow IBM Network Science Research Center RCSI Royal College of Surgeons in Ireland Coláiste Ríoga na Máinleá in Éirinn

What is CyberPsychology? Field within applied psychology Internet psychology, virtual environments, AI & IA, gaming, digital convergence, social media, mobile telephones and networking devices 30 peer-reviewed journals: 1,000 articles CyberPsychology: exponential growth due to continued rapid acceleration of Internet technologies and the ‘unprecedentedly pervasive and profound influence of the internet on human beings’ (Yan, 2012) 1 2

Psychology of Cyberspace Interest in cyberspace: cognitive, social, educational, organisational, personality, clinical and experimental psychologists. Traditional ‘real world theories’ – will they suffice? do we need to modify - or develop new ones? Interdisciplinary scholars are crystalising new ideas and moving towards conquering a new scientific frontier 3

‘State & Trait’ in Cyberspace 4 Anonymity (Joinson, 2001) Online disinhibition effect (Suler, 2004) Cyber immersion (Takatalo et al., 2008) Cyber presence (Riva et al., 2007) Self-presentation online (Gibbs et al., 2006) Privacy (McMahon & Aiken, 2014; Barnes, 2006) Escalation online (White & Horvitz, 2002) Altruism (Adar & Huberman, 2000) Trust (Putnam, 2000) Identity (Turkle, 1999; Gross & Acquisti, 2005)

Cyber Security CyberPsychology: Delivering insight at the human/technology interface Privacy Environment Trust Needs Habits & Emotions Identity Presence Anonymity Intelligence Amplification Socialisation Resilience Communication Personality Ethics Big Data Regulation Artificial Intelligence Mobile Cyber Defence IOT BYOD Network Security Malware Risk Authentication Ubiquitous Cities Biometrics HumanTechnology CyberPsychology

Key Perspectives 5 Consideration of Cyber Security in the context of CyberPsychological factors 1. Cyber security & ‘factoring in the human’ - Person vs. User - State & Trait - Real World vs. Virtual World Self (org. insider threat) - Organizational CyberPsychology: Hierarchical vs. Networked (zero day scenario) - Cyber Behavioral Profiling – NB Motive (primary & secondary gains) 2. Cyberspace as an environment - Immersive vs. Transactional - Need to update/revise definitions? Privacy, Identity, Trust, Security, Resilience - Minimisation of Status and Authority in Cyberspace 3. Cyber technologies - Artificial Intelligence (A.I) v’s Intelligence Amplification (I.A) - Scientific Creativity - Cyber Ethics / Cyber-Tort

Research Vision Cyberpsychology approach: understanding new norms of behaviour online Theoretically profound, experimentally rigorous, developmentally longitudinal, technically sophisticated to achieve longlasting positive societal effects Adhere to principles of Virtual Research Methodology

Our vision is that the CyberPsychology Research Centre will become a global leader in delivering research and insight at the intersection of psychology and technology Thank you