Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber-crime Science Pieter Hartel. The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three »Do an experiment »Write.

Similar presentations


Presentation on theme: "Cyber-crime Science Pieter Hartel. The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three »Do an experiment »Write."— Presentation transcript:

1 Cyber-crime Science Pieter Hartel

2 The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three »Do an experiment »Write a paper »Review other papers »Present the paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science 2

3 Team Lecturers »Pieter Hartel (course organisation, computer science) »Marianne Junger (social science) Teaching assistants »Lorena Montoya »Jan Willem Bullée »Elmer Lastdrager »Inés Carvaljal Gallardo 3 Cyber-crime Science

4 Contents Theory »What is Crime and Cyber-crime? »Technology (ICT) creates opportunity »Crime Science »Opportunity reduction works Practice »How to do an opportunity reducing experiment in this course? Cyber-crime Science 4

5 Crime and Cyber-crime Crime »Behaviour commonly considered harmful, serious Disorder »Lack of order, broader than crime Cyber-crime »ICT used as a tool, target or place 5 [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science

6 Porn on video billboard Cyber-crime Science 6

7 Cyber-crime is big business Estimate (B$)Year Anti-virus3.42012 Patching12010 ISP clean-up0.042010 User clean-up102012 Defence firms102010 Law enforcement0.42010 7 [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science

8 ICT creates opportunity Offenders know that they run little risk Targets often don’t understand the risks Cyber-crime Science 8

9 Crime Science Five principles of opportunity reduction 1.Increase effort 2.Increase risks 3.Reduce rewards 4.Reduce provocation 5.Remove excuses Measure the effect of the intervention Cyber-crime Science 9

10 Opportunity reduction works 10 [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 http://dx.doi.org/10.1145/1572532.1572536 Clicked on link (%) Cyber-crime Science

11 Practice Cyber-crime Science 11

12 12 Question Is an intervention as coursework feasible? »Yes, but it’s hard work »… and it can be a lot of fun Check out what 43 teams have done in previous years [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science

13 13 Interactive trash cans, N=24 Cyber-crime Science

14 14 Social Sports leak, N=308 Cyber-crime Science [Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports networks as crime facilitators. Crime Science, 3:Article 8, 2014. http://dx.doi.org/10.1186/s40163-014-0008-z. http://dx.doi.org/10.1186/s40163-014-0008-z.

15 15 Course Schedule team+ topic Draft research proposal Final proposal & slide Experiment & draft paper final paper review & slides (5 weeks) (6 weeks) (9 weeks) PII form Reviewing Research Methods Presentations Ethical committee APA paper writing Present ideas Present again Cyber-crime Science

16 Help is at hand What? »Clinics: get feedback or discuss »F2F in Enschede or via Skype When? »Sign up via the doodle to get a 20-minute timeslot »12 and 19 September, 3 October and more More details on website Cyber-crime Science 16

17 17 Examination By coursework only »Quality of the paper »Quality of the reviews »Quality of the presentations You will be marked by your peers »And you may not like it… »But the lecturers and TAs are the moderators Cyber-crime Science

18 18 FAQ Team topic (week 1) »What is the crime/disorder and how will you prevent it? Draft proposal (week 3) »What are the risks for the researchers and the subjects? »What is the control group? Final draft proposal (week 5) »Does my design work? Do a pilot! Draft paper (week 14) »Can someone else repeat the experiment? Final paper (week 18) »Are the results statistically significant? Cyber-crime Science

19 19 What to do next? 1.Sign up via the site 2.Complete and sign the PII form now 3.Social science training : 0.5 bonus point 4.Write 1 A4 Research proposal with: »Background »Method »Three key references »Appendix: Checklist Ethical Committee 5.For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science

20 Project ideas Elmer (e.e.h.lastdrager@utwente.nl) »Phishing on Facebook »Phishing puzzles Lorena (a.l.montoya@utwente.nl) »Socio-physical differences in the compliance to a request to surrender credentials Jan-Willem (j.h.bullee@utwente.nl) »Social engineering for software updates »Dynamic digital interventions Cyber-crime Science 20


Download ppt "Cyber-crime Science Pieter Hartel. The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three »Do an experiment »Write."

Similar presentations


Ads by Google