SlideShare ist ein Scribd-Unternehmen logo
1 von 67
©2009CarnegieMellonUniversity:1
Applying the Wisdom of Crowds
to Usable Privacy and Security
Jason I. Hong
Carnegie Mellon University
©2011CarnegieMellonUniversity:2
Usable Privacy and Security
• Cyber security is a national priority
– Increasing levels of malware and phishing
– Accidental disclosures of sensitive info
– Reliability of critical infrastructure
• Privacy concerns growing as well
– Breaches and theft of customer data
– Ease of gathering, storing, searching
• Increasing number of issues deal with
human element
©2011CarnegieMellonUniversity:3
Fake Interfaces to Trick People
Fake Anti-Virus
(installs malware)
©2011CarnegieMellonUniversity:4
Misconfigurations
Facebook controls
for managing
sharing preferences
©2011CarnegieMellonUniversity:5
Too Many Passwords
©2011CarnegieMellonUniversity:6
Other Examples
• Web browser certificates
• Do not track / behavioral advertising
• Location privacy
• Online social network privacy
• Intrusion detection and visualizations
• Effective warnings
• Effective security training
• …
©2011CarnegieMellonUniversity:7
Usable Privacy and Security
“Give end-users security controls they
can understand and privacy they can
control for the dynamic, pervasive
computing environments of the future.”
CRA “Grand Challenges in Information Security
& Assurance” 2003
©2011CarnegieMellonUniversity:8
Today’s Talk
• Apply crowdsourcing to speed up
detection of phishing web sites
• Using location data to understand
people, places, and relationships
• Using crowdsourcing to understand
privacy of mobile apps
©2011CarnegieMellonUniversity:9
Today’s Talk
• Apply crowdsourcing to speed up
detection of phishing web sites
• Using location data to understand
people, places, and relationships
• Using crowdsourcing to understand
privacy of mobile apps
©2009CarnegieMellonUniversity:10
Smartening the Crowds:
Computational Techniques for
Improving Human Verification
to Fight Phishing Scams
Symposium on Usable Privacy and Security 2011
Gang Liu
Wenyin Liu
Department of Computer Science
City University of Hong Kong
Guang Xiang
Bryan A. Pendleton
Jason I. Hong
Carnegie Mellon University
©2011CarnegieMellonUniversity:11
• RSA SecurID
• Lockheed-Martin
• Gmail
• Epsilon mailing list
• Australian government
• Canadian government
• Oak Ridge Nat’l Labs
• Operation Aurora
©2011CarnegieMellonUniversity:12
Detecting Phishing Websites
• Method 1: Use heuristics
– Unusual patterns in URL, HTML, topology
– Approach favored by researchers
– High true positives, some false positives
• Method 2: Manually verify
– Approach used by industry blacklists today
(Microsoft, Google, PhishTank)
– Very few false positives, low risk of liability
– Slow, easy to overwhelm
©2011CarnegieMellonUniversity:13
©2011CarnegieMellonUniversity:14
©2011CarnegieMellonUniversity:15
©2011CarnegieMellonUniversity:16
Wisdom of Crowds Approach
• Mechanics of PhishTank
– Submissions require at least 4 votes
and 70% agreement
– Some votes weighted more
• Total stats (Oct2006 – Feb2011)
– 1.1M URL submissions from volunteers
– 4.3M votes
– resulting in about 646k identified phish
• Why so many votes for only 646k phish?
©2011CarnegieMellonUniversity:17
PhishTank Statistics
Jan 2011
Submissions 16019
Total Votes 69648
Valid Phish 12789
Invalid Phish 549
Median Time 2hrs 23min
• 69648 votes → max of 17412 labels
– But only 12789 phish and 549 legitimate identified
– 2681 URLs not identified at all
• Median delay of 2+ hours still has room
for improvement (used to be 12 hours)
©2011CarnegieMellonUniversity:18
Why Care?
• Can improve performance of
human-verified blacklists
– Dramatically reduce time to blacklist
– Improve breadth of coverage
– Offer same or better level of accuracy
• More broadly, new way of improving
performance of crowd for a task
©2011CarnegieMellonUniversity:19
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2011CarnegieMellonUniversity:20
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2011CarnegieMellonUniversity:21
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2011CarnegieMellonUniversity:22
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2011CarnegieMellonUniversity:23
Ways of Smartening the Crowd
• Change the order URLs are shown
– Ex. most recent vs closest to completion
• Change how submissions are shown
– Ex. show one at a time or in groups
• Adjust threshold for labels
– PhishTank is 4 votes and 70%
– Ex. vote weights, algorithm also votes
• Motivating people / allocating work
– Filtering by brand, competitions,
teams of voters, leaderboards
©2011CarnegieMellonUniversity:24
Overview of Our Work
• Crawled unverified submissions from
PhishTank over 2 week period
• Replayed URLs on MTurk over 2 weeks
– Required participants to play
2 rounds of Anti-Phishing Phil
– Clustered phish by html similarity
– Two cases: phish one at a time, or in a
cluster (not strictly separate conditions)
– Evaluated effectiveness of vote weight
algorithm after the fact
©2011CarnegieMellonUniversity:25
Anti-Phishing Phil
• We had MTurkers play two rounds of
Phil [Sheng 2007] to qualify (µ = 5.2min)
• Goal was to reduce lazy MTurkers and
ensure base level of knowledge
©2011CarnegieMellonUniversity:26
©2011CarnegieMellonUniversity:27
©2011CarnegieMellonUniversity:28
Clustering Phish
• Observations
– Most phish are generated by toolkits and
thus are similar in content and appearance
– Can potentially reduce labor by labeling
suspicious sites in bulk
– Labeling single sites as phish can be hard
if unfamiliar, easier if multiple examples
©2011CarnegieMellonUniversity:29
Clustering Phish
• Motivations
– Most phish are generated by toolkits and
thus similar
– Labeling single sites as phish can be hard,
easier if multiple examples
– Reduce labor by labeling suspicious sites
in bulk
©2011CarnegieMellonUniversity:30
Clustering Phish
• Motivations
– Most phish are generated by toolkits and
thus similar
– Labeling single sites as phish can be hard,
easier if multiple examples
– Reduce labor by labeling suspicious sites
in bulk
©2011CarnegieMellonUniversity:31
Most Phish Can be Clustered
• With all data over two weeks, 3180 of
3973 web pages can be grouped (80%)
– Used shingling and DBSCAN (see paper)
– 392 clusters, size from 2 to 153 URLs
©2011CarnegieMellonUniversity:32
©2011CarnegieMellonUniversity:33
MTurk Tasks
• Two kinds of tasks, control and cluster
– Listed these two as separate HITs
– MTurkers paid $0.01 per label
– Cannot do between-conditions on MTurk
– MTurker saw a given URL at most once
• Four votes minimum, 70% threshold
– Stopped at 4 votes, cannot dynamically
request more votes on MTurk
– 153 (3.9%) in control and 127 (3.2%) in
cluster not labeled
©2011CarnegieMellonUniversity:34
MTurk Tasks
• URLs were replayed in order
– Ex. If crawled at 2:51am from PhishTank
on day 1, then we would replay at 2:51am
on day 1 of experiment
– Listed new HITs each day rather than a
HIT lasting two weeks (to avoid delays
and last minute rush)
©2011CarnegieMellonUniversity:35
Summary of Experiment
• 3973 suspicious URLs
– Ground truth from Google, MSIE, and
PhishTank, checked every 10 min
– 3877 were phish, 96 not
• 239 MTurkers participated
– 174 did HITs for both control and cluster
– 26 in Control only, 39 in Cluster only
• Total of 33,781 votes placed
– 16,308 in control
– 11,463 in cluster (17473 equivalent)
• Cost (participants + Amazon): $476.67 USD
©2011CarnegieMellonUniversity:36
Results of Aquarium
• All votes are the individual votes
• Labeled URLs are after aggregation
©2011CarnegieMellonUniversity:37
Comparing Coverage and Time
©2011CarnegieMellonUniversity:38
Voteweight
• Use time and accuracy to weight votes
– Those who vote early and accurately
are weighted more
– Older votes discounted
– Incorporates a penalty for wrong votes
• Done after data was collected
– Harder to do in real-time since we don’t
know true label until later
• See paper for parameter tuning
– Of threshold and penalty function
©2011CarnegieMellonUniversity:39
Voteweight Results
• Control condition best scenario
– Before-after
– 94.8% accuracy, avg 11.8 hrs, median 3.8
– 95.6% accuracy, avg 11.0 hrs, median 2.3
• Cluster condition best scenario
– Before-after
– 95.4% accuracy, avg 1.8 hrs, median 0.7
– 97.2% accuracy, avg 0.8 hrs, median 0.5
• Overall: small gains, potentially more
fragile and more complex though
©2011CarnegieMellonUniversity:40
Limitations of Our Study
• Two limitations of MTurk
– No separation between control and cluster
– ~3% tie votes unresolved (more votes)
• Possible learning effects?
– Hard to tease out with our data
– Aquarium doesn’t offer feedback
– Everyone played Phil
– No condition prioritized over other
• Optimistic case, no active subversion
©2011CarnegieMellonUniversity:41
Conclusion
• Investigated two techniques for
smartening the crowd for anti-phishing
– Clustering and voteweight
• Clustering offers significant
advantages wrt time and coverage
• Voteweight offers smaller
improvements in effectiveness
©2011CarnegieMellonUniversity:42
Today’s Talk
• Apply crowdsourcing to speed up
detection of phishing web sites
• Using location data to understand
people, places, and relationships
• Using crowdsourcing to understand
privacy of mobile apps
©2009CarnegieMellonUniversity:43
Bridging the Gap Between
Physical Location and Online
Social Networks
12th
International Conference on
Ubiquitous Computing (Ubicomp 2010)
Justin Cranshaw
Eran Toch
Jason Hong
Aniket Kittur
Norman Sadeh
Carnegie Mellon University
©2011CarnegieMellonUniversity:44
Understanding Human Behavior
at Large Scales
• Capabilities of today’s mobile devices
– Location, sound, proximity, motion
– Call logs, SMS logs, pictures
• We can now analyze real-world social
networks and human behaviors at
unprecedented fidelity and scale
• 2.8m location sightings
of 489 participants in Pittsburgh
©2011CarnegieMellonUniversity:45
• Insert graph here
• Describe entropy
©2011CarnegieMellonUniversity:46
Early Results
• Can predict Facebook friendships
based on co-location patterns
– 67 different features
• Intensity and Duration
• Location diversity (entropy)
• Mobility
• Specificity (TF-IDF)
• Graph structure (mutual neighbors, overlap)
– 92% accuracy in predicting friend/not
©2011CarnegieMellonUniversity:47
Using features like
location entropy
significantly improves
performance over
shallow features such
as #co-locations
©2011CarnegieMellonUniversity:48
Intensity
features
Intensity
features
Numberofco-
locations
Numberofco-
locations
W
ithout intensity
Full m
odel
©2011CarnegieMellonUniversity:49
Early Results
• Can predict number of friends based
on mobility patterns
– People who go out often, on weekends,
and to high entropy places tend to have
more friends
– (Didn’t check age though)
©2011CarnegieMellonUniversity:50
Entropy Related to Location Privacy
©2011CarnegieMellonUniversity:51
Collective Real-World Intelligence
• Location data alone can tell us a lot
about people, the places they go,
the relationships they have
• Characterizing individuals
– Personal frequency
– Personal mobility pattern
• Characterizing social quality of places
– Entropy – number of unique people
– Churn – same people or different
– Transience – amount of time spent
– Burst – regularity of people seen
©2011CarnegieMellonUniversity:52
Collective Real-World Intelligence
• Apps for Usable Privacy and Security
– Using places for authentication
– Protecting geotagged data
• 4.3% Flickr photos, 3% YouTube,
1% Craigslist photos geotagged
©2011CarnegieMellonUniversity:53
Collective Real-World Intelligence
• Other potential apps and analyses:
– Architecture and urban design
– Use of public resources (e.g. buses)
– Traffic Behavioral Inventory (TBI)
– Characterizing neighborhoods
– What do Pittsburghers do?
©2011CarnegieMellonUniversity:54
Crowdsourcing Location Data
• How to incentivize thousands of
people in multiple cities to run our app?
– Pay?
– Altruism?
– Enjoyment?
– Side effect?
• Key difference is highly sensitive
personal data (vs microtasks)
©2011CarnegieMellonUniversity:55
Today’s Talk
• Apply crowdsourcing to speed up
detection of phishing web sites
• Using location data to understand
people, places, and relationships
• Using crowdsourcing to
understand privacy of mobile apps
©2011CarnegieMellonUniversity:56
Shares your location,
gender, unique phone ID,
phone# with advertisers
Uploads your entire
contact list to their server
(including phone #s)
What are your apps really doing?
• WSJ analysis of 101 apps found half
share phone’s unique ID and location
©2011CarnegieMellonUniversity:57
Android
• What do these
permissions mean?
• Why does app need
this permission?
• When does it use
these permissions?
©2011CarnegieMellonUniversity:58
Research on Scanning Apps
• TaintDroid intercepts certain calls and
asks user if it’s ok
• Others scan binaries
– Ex. what web sites it connects to
• Others scan what goes on the network
– Ex. “looks like a SSN”
©2011CarnegieMellonUniversity:59
Our Position
• No automated technique will ever be
able to differentiate between
acceptable and unacceptable behavior
• Many false positives b/c
scanners also flag things
app does by design
– Ex. Flagging Evernote for
connecting to their servers
©2011CarnegieMellonUniversity:60
Crowdsourcing and Privacy
• Re-frame privacy as expectations
– Capture what people expect an app to do
– See how well app matches expectations
– Use top mismatches as privacy summary
for non-experts (and for devs)
• Use crowdsourcing to accomplish this
– Ideally would like experts, but experts
don’t scale
– 300k Android apps, 500k iPhone apps
©2011CarnegieMellonUniversity:61
Screen-by-Screen Probing
• Generate tree
of UI screens
…
©2011CarnegieMellonUniversity:62
Screen-by-Screen Probing
• Scan app to capture
what happens if a
person transitions
from one screen to
another
…
Gets location
Sends to yelp.com
Gets contacts
Sends to yelp.com
©2011CarnegieMellonUniversity:63
Screen-by-Screen Probing
What data do you think is sent to Yelp if you click the “Nearby” icon?
• Current location
• Contact List
• Phone call log
• SMS log
• Unique phone ID
• …
©2011CarnegieMellonUniversity:64
Screen-by-Screen Probing
How comfortable would you be if the Yelp app sent your current
location to the Yelp servers when you click on the “Nearby” icon?
©2011CarnegieMellonUniversity:65
Screen-by-Screen Probing
• Use top mismatches to generate new
privacy summaries
– Ex. “93% of people didn’t expect Facebook
app to send contact list to their servers”
• Current work:
– Building remote evaluation tool
– Creating screen mockups to compare
expert vs MTurker results
• Can MTurkers understand the data types?
• Can MTurkers offer mostly accurate results?
©2011CarnegieMellonUniversity:66
What’s New and Different for
Crowdsourcing?
• New crowdsourcing issues with security
– Active and adaptive adversaries
– Timeliness has new urgency
• New ways of understanding human
behaviors at large scale thru location
– Incentivizing people to share data
• New ways of gauging end-user privacy
– Possibly new way of understanding privacy
– Structuring tasks so that novices can give
useful feedback
©2011CarnegieMellonUniversity:67
Acknowledgments
• CyLab and Army Research Office
• Research Grants Council of the Hong
Kong Special Administrative Region
• Alfred P. Sloan Foundation
• Google
• DARPA

Weitere ähnliche Inhalte

Andere mochten auch

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Andere mochten auch (6)

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Ă„hnlich wie Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourcing Seminar Oct 2011

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable AuthenticationJason Hong
 
Predictive Solutions and Analytics for TV & Entertainment Businesses
Predictive Solutions and Analytics for TV & Entertainment BusinessesPredictive Solutions and Analytics for TV & Entertainment Businesses
Predictive Solutions and Analytics for TV & Entertainment BusinessesDavid Zibriczky
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Automatically Labeling Facts in a Never-Ending Langue Learning system
Automatically Labeling Facts in a Never-Ending Langue Learning systemAutomatically Labeling Facts in a Never-Ending Langue Learning system
Automatically Labeling Facts in a Never-Ending Langue Learning systemEstevam Hruschka
 
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...D. Warnick Consulting
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGHuman Capital Media
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
Helping the 3rd Sector be more efficient and effective
Helping the 3rd Sector be more efficient and effectiveHelping the 3rd Sector be more efficient and effective
Helping the 3rd Sector be more efficient and effectiveThe OR Society
 
Strategies for success - volunteer recruitment & prevention of over-volunteer...
Strategies for success - volunteer recruitment & prevention of over-volunteer...Strategies for success - volunteer recruitment & prevention of over-volunteer...
Strategies for success - volunteer recruitment & prevention of over-volunteer...Steffan Stringer
 
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...Codemotion
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Pete Burnap
 
A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationBenjamin Heitmann
 
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...Angela Fessl
 
Influence of Timeline and Named-entity Components on User Engagement
Influence of Timeline and Named-entity Components on User Engagement Influence of Timeline and Named-entity Components on User Engagement
Influence of Timeline and Named-entity Components on User Engagement Roi Blanco
 
Managerial Decision-Making
Managerial Decision-MakingManagerial Decision-Making
Managerial Decision-MakingLee Schlenker
 
Self Service Online Research - online communities for research and insights
Self Service Online Research - online communities for research and insightsSelf Service Online Research - online communities for research and insights
Self Service Online Research - online communities for research and insightsStephen Thompson
 

Ă„hnlich wie Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourcing Seminar Oct 2011 (20)

Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
 
Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 Webinar
 
Predictive Solutions and Analytics for TV & Entertainment Businesses
Predictive Solutions and Analytics for TV & Entertainment BusinessesPredictive Solutions and Analytics for TV & Entertainment Businesses
Predictive Solutions and Analytics for TV & Entertainment Businesses
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Automatically Labeling Facts in a Never-Ending Langue Learning system
Automatically Labeling Facts in a Never-Ending Langue Learning systemAutomatically Labeling Facts in a Never-Ending Langue Learning system
Automatically Labeling Facts in a Never-Ending Langue Learning system
 
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...
How Did All These People Get Here? Looking Beyond Level 1 Outcomes in Live Ev...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Chap2 mrkt263
Chap2 mrkt263Chap2 mrkt263
Chap2 mrkt263
 
Helping the 3rd Sector be more efficient and effective
Helping the 3rd Sector be more efficient and effectiveHelping the 3rd Sector be more efficient and effective
Helping the 3rd Sector be more efficient and effective
 
Strategies for success - volunteer recruitment & prevention of over-volunteer...
Strategies for success - volunteer recruitment & prevention of over-volunteer...Strategies for success - volunteer recruitment & prevention of over-volunteer...
Strategies for success - volunteer recruitment & prevention of over-volunteer...
 
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...
The Secrets of High Performance: Science Edition - Nicole Forsgren - Codemoti...
 
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
Real-time Classification of Malicious URLs on Twitter using Machine Activity ...
 
A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisation
 
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...
Improving Search Strategies of Auditors –A Focus Group on Reflection Interven...
 
Influence of Timeline and Named-entity Components on User Engagement
Influence of Timeline and Named-entity Components on User Engagement Influence of Timeline and Named-entity Components on User Engagement
Influence of Timeline and Named-entity Components on User Engagement
 
Managerial Decision-Making
Managerial Decision-MakingManagerial Decision-Making
Managerial Decision-Making
 
2021 Census collection strategy
2021 Census collection strategy2021 Census collection strategy
2021 Census collection strategy
 
Self Service Online Research - online communities for research and insights
Self Service Online Research - online communities for research and insightsSelf Service Online Research - online communities for research and insights
Self Service Online Research - online communities for research and insights
 

KĂĽrzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

KĂĽrzlich hochgeladen (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourcing Seminar Oct 2011

Hinweis der Redaktion

  1. Entropy related to location privacy Fewer concerns in “public” places
  2. What this means is, just looking at very obvious properties of the co-locations histories doesn't really tell you very much. Also, notice most of the performance boost is at low levels of recall. so if you want to build a high-precision classifier this is the best approach. Really there are two stories here. first it's that the intensity features do not really provide much of a gain over just looking at the number of locations, especially at high recall levels. Second, is that location based features significantly improves performance. This validates that these are clearly good things to look at when you're analyzing this kind of data
  3. What this means is, just looking at very obvious properties of the co-locations histories doesn't really tell you very much. Also, notice most of the performance boost is at low levels of recall. so if you want to build a high-precision classifier this is the best approach. Really there are two stories here. First it's that the intensity features (time spent co-located) do not really provide much of a gain over just looking at the number of locations, especially at high recall levels. Second, is that location based features (ie entropy) significantly improves performance. This validates that these are clearly good things to look at when you're analyzing this kind of data
  4. Entropy related to location privacy Fewer concerns in “public” places
  5. Compare privacy as expectations with: Flow control, informed consent, not sharing information, solitude