SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Social Cybersecurity:
Ideas for Nudging Secure Behaviors
Through Social Influences
Cori Faklaris | Oct. 19, 2018
Presentation to the
2018 Three Rivers Information Security Symposium
(TRISS 2018),
Monroeville, Pa., USA
@heycori
Human-Computer Interaction Institute
2
Cialdini’s ‘Weapons of Influence’
1. Reciprocation
2. Commitment and
Consistency
3. Social Proof
4. Liking
5. Authority
6. Scarcity
Robert B. Cialdini. 2001 (4th ed.). Influence.
A. Michel Port Harcourt.
Cori Faklaris - October 2018 - TRISS 2018 | Page2
@heycori
Agenda
✖ About me
✖ About the Social Cybersecurity project
✖ Ideas to apply this work in your context
✖ Next steps for our research
Feel free to ask questions at any point.
Cori Faklaris - October 2018 - TRISS 2018 | Page3
@heycori
Cori Faklaris - October 2018 - TRISS 2018 | Page4
● PhD student researcher at Carnegie Mellon University
○ Social cybersecurity, Design of information systems, Emerging
trends in social media and messaging apps
● M.S., Human-Computer Interaction
○ Indiana University School of Informatics and Computing
○ Thesis: The State of Digital ‘Fair Use’
● B.S., Journalism, News-Editorial sequence
○ University of Illinois at Urbana-Champaign College of Media
● Social Media Consultant and Editor/Writer
● Previous job titles in news media included:
○ Engagement Producer, Page Designer, Copy Editor, Correspondent,
Columnist, Reporter ...
○ “Doer of Things No One Else Wants to Do” (IT, UX :-)
About me
@heycori
5Cori Faklaris - October 2018 - TRISS 2018 | Page5
@heycori
6Cori Faklaris - October 2018 - TRISS 2018 | Page6
Friend 1, Friend 2, Friends 3 & 4,
6
@heycori
7
Cialdini’s ‘Weapons of Influence’
1. Reciprocation
2. Commitment and
Consistency
3. Social Proof
4. Liking
5. Authority
6. Scarcity
Robert B. Cialdini. 2001 (4th ed.). Influence.
A. Michel Port Harcourt.
Cori Faklaris - October 2018 - TRISS 2018 | Page7
@heycori
1.
Reciprocation
We desire to repay in kind
what someone else does for us.
“I’ll scratch your back if you scratch mine.”
- English idiom, Latin: quid pro quo
8Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
9
Reciprocation & Cybersecurity …
1. Give a gift that
obliges behaviors.
a. USB drive
containing safe
software & apps
b. ‘Thank you’ card
2. Frame requests as
a “big ask,”
followed by the
real ask.
Cori Faklaris - October 2018 - TRISS 2018 | Page9
@heycori
2.
Commitment
and Consistency
Once we make a choice and take a stand,
we feel pressure to live up to that commitment.
“How are you? Good, are you willing to donate ...”
- the ‘Foot-in-the-door’ sales technique
10Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
11
Commitment and Consistency
& Cybersecurity …
1. Ask system users
to “please watch
out for” mistakes
in security
protocol.
2. Ask users to sign
their names to a
public promise to
use security tools
and practices.
Cori Faklaris - October 2018 - TRISS 2018 | Page11
@heycori
3.
Social Proof
We view a behavior as correct in a given situation
to the degree that we can observe others
performing it.
“Fifty million Americans can’t be wrong ...”
- Type of phrase often used in advertising copy
12Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
13
Social Proof & Cybersecurity …
1. Display statistics
or facts about
security behaviors
via a lock screen or
new browser tab.
2. Crowdsource
security tips, then
publicize them to
the work group.
Cori Faklaris - October 2018 - TRISS 2018 | Page13
@heycori
FACT: Carnegie
Mellon University
has not suffered a
breach of payroll
systems since
adopting 2FA.
4.
Liking
Our personal affinities are bound up in cooperation
and compliance – and vice versa.
“Flattery will get you everywhere.”
- Mae West, 20th century movie actress
- See also “Good Cop, Bad Cop”
14Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
15
Liking & Cybersecurity …
1. Recruit a popular
member of a
workgroup as a
helper and ally for
InfoSec initiatives.
2. Set a group goal
for security
behaviors, with
rewards for
improvements.
Cori Faklaris - October 2018 - TRISS 2018 | Page15
@heycori
5.
Authority
We have an instinct to obey people who are
presented to us as authority figures and/or experts.
“The apparel oft proclaims the man.”
- Polonius in Hamlet, William Shakespeare
16Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
17
Authority & Cybersecurity …
1. Cite security
experts or
research to back
up why you
require a security
tool or practice.
2. Train end users to
avoid being
tricked by fake
authorities.
Cori Faklaris - October 2018 - TRISS 2018 | Page17
You should be
thinking right now:
Is this a legitimate
business card???
@heycori
http://www.shsu.edu/dept/it@sam/tech
nology-tutorials/duo/
18
6.
Scarcity
Limiting access to a resource (or seeming to)
makes it more desirable.
“Don’t wait! Last chance before they’re gone!”
- Type of phrase often used in advertising copy
19Cori Faklaris - October 2018 - TRISS 2018 | Page 2
@heycori
20
Scarcity & Cybersecurity …
1. Frame the use of
security tools or
practices in terms
of losses rather
than benefits.
2. Avoid erratic
enforcement that
leads to revoking
privileges from
end users.
Cori Faklaris - October 2018 - TRISS 2018 | Page20
1 in 5 breaches can’t be prevented
by implementing 2FA - I need to
stay vigilant for hackers!
@heycori
21
Cialdini’s ‘Weapons of Influence’
1. Reciprocation
2. Commitment and
Consistency
3. Social Proof
4. Liking
5. Authority
6. Scarcity
Robert B. Cialdini. 2001 (4th ed.). Influence.
A. Michel Port Harcourt.
Cori Faklaris - October 2018 - TRISS 2018 | Page21
@heycori
Works in Progress
✖ Psychometric scale to help target end-user
interventions by security sensitivity.
✖ “Security score” for end users.
✖ Game apps to simulate social actions and
competition around security practices.
✖ Interviews with IT professionals about
challenges for workgroups who share
accounts and devices.
✖ Browser plugin to make crowd opinions
about privacy & security settings observable.
Cori Faklaris - October 2018 - TRISS 2018 | Page22
@heycori
23Cori Faklaris - October 2018 - TRISS 2018 | Page23
@heycori
Das, Sauvik, "Social
Cybersecurity:
Reshaping Security
Through An Empirical
Understanding of
Human Social
Behavior" (2017).
Dissertations. 982.
http://repository.cmu.e
du/dissertations/982
“Security Sensitivity” indicates an end user’s
degree of receptiveness to advice and to using
security tools and best practices in everyday life.
Works in Progress
✖ Psychometric scale to help target security
interventions by readiness to change.
✖ “Security score” for end users.
✖ Game apps to simulate social actions and
competition around security practices.
✖ Interviews with IT professionals about
challenges for workgroups who share
accounts and devices.
✖ Browser plugin to make crowd opinions
about privacy & security settings observable.
Cori Faklaris - October 2018 - TRISS 2018 | Page24
@heycori
https://sijier.000webhostapp.com/
25Cori Faklaris - October 2018 - TRISS 2018 | Page25
@heycori
Works in Progress
✖ Psychometric scale to help target security
interventions by readiness to change.
✖ “Security score” for end users.
✖ Game apps to simulate social actions and
competition around security practices.
✖ Interviews with IT professionals about
challenges for workgroups who share
accounts and devices.
✖ Browser plugin to make crowd opinions
about privacy & security settings observable.
Cori Faklaris - October 2018 - TRISS 2018 | Page26
@heycori
27Cori Faklaris - October 2018 - TRISS 2018 | Page27
@heycori
Try it at https://tinyurl.com/CrowdFBTool
Cialdini’s ‘Weapons of Influence’
1. Reciprocation
2. Commitment and Consistency
3. Social Proof
4. Liking
5. Authority
6. Scarcity
Any Questions? Partnership Ideas?
You can find me at
● Email: heycori @cmu.edu
● Website: http://corifaklaris.com
@heycori

Weitere ähnliche Inhalte

Ähnlich wie Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences

Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and PrivacyCori Faklaris
 
Social Engineering and other Foes in the GDPR Year
Social Engineering and other Foes in the GDPR YearSocial Engineering and other Foes in the GDPR Year
Social Engineering and other Foes in the GDPR YearMassimo Chirivì
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AILofred Madzou
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018 James Quinlan
 
When Privacy Scales - Intelligent Product Design under GDPR
When Privacy Scales - Intelligent Product Design under GDPRWhen Privacy Scales - Intelligent Product Design under GDPR
When Privacy Scales - Intelligent Product Design under GDPRAmanda Casari
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeMark Underwood
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Saidot
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsChristina Lekati
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingJoseph Pindar
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
Software Backdoors, Chiaravalle
Software Backdoors, ChiaravalleSoftware Backdoors, Chiaravalle
Software Backdoors, ChiaravalleAdam Chiaravalle
 
Artificial intellect ukraine
Artificial intellect ukraineArtificial intellect ukraine
Artificial intellect ukraineananko
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaRinshad Choorappara
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 

Ähnlich wie Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences (20)

Designing for Usable Security and Privacy
Designing for Usable Security and PrivacyDesigning for Usable Security and Privacy
Designing for Usable Security and Privacy
 
Social Engineering and other Foes in the GDPR Year
Social Engineering and other Foes in the GDPR YearSocial Engineering and other Foes in the GDPR Year
Social Engineering and other Foes in the GDPR Year
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AI
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
When Privacy Scales - Intelligent Product Design under GDPR
When Privacy Scales - Intelligent Product Design under GDPRWhen Privacy Scales - Intelligent Product Design under GDPR
When Privacy Scales - Intelligent Product Design under GDPR
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider Threats
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
Software Backdoors, Chiaravalle
Software Backdoors, ChiaravalleSoftware Backdoors, Chiaravalle
Software Backdoors, Chiaravalle
 
Artificial intellect ukraine
Artificial intellect ukraineArtificial intellect ukraine
Artificial intellect ukraine
 
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad ChoorapparaEthical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
Ethical Dimensions of Artificial Intelligence (AI) by Rinshad Choorappara
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 

Mehr von Cori Faklaris

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid EdgeCori Faklaris
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AICori Faklaris
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social InfluencesCori Faklaris
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...Cori Faklaris
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Cori Faklaris
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Cori Faklaris
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”Cori Faklaris
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Cori Faklaris
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...Cori Faklaris
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slidesCori Faklaris
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesCori Faklaris
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile Cori Faklaris
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning studentCori Faklaris
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineCori Faklaris
 

Mehr von Cori Faklaris (16)

Human Factors at the Grid Edge
Human Factors at the Grid EdgeHuman Factors at the Grid Edge
Human Factors at the Grid Edge
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Behavior Change Using Social Influences
Behavior Change Using Social InfluencesBehavior Change Using Social Influences
Behavior Change Using Social Influences
 
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
How can we boost 'cyber health' ? Psychometrics, social appeals and tools for...
 
A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)A Self-Report Measure of End-User Security Attitudes (SA-6)
A Self-Report Measure of End-User Security Attitudes (SA-6)
 
Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'Reframing Usable Privacy + Security to Design for 'Cyber Health'
Reframing Usable Privacy + Security to Design for 'Cyber Health'
 
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
Share & Share Alike? An Exploration of Secure Behaviors in Romantic Relations...
 
Reframing Organizational Cybersecurity to Design for “Cyber Health”
Reframing  Organizational Cybersecurity to Design for “Cyber Health”Reframing  Organizational Cybersecurity to Design for “Cyber Health”
Reframing Organizational Cybersecurity to Design for “Cyber Health”
 
Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017Social Media Best Practices - CMU Fall 2017
Social Media Best Practices - CMU Fall 2017
 
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...If You Are Going To Skydive, You Need a Parachute:  Navigating the World of H...
If You Are Going To Skydive, You Need a Parachute: Navigating the World of H...
 
"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides"Visualizing Email Content": Article discussion slides
"Visualizing Email Content": Article discussion slides
 
Together: An app to foster community for young urbanites
Together: An app to foster community for young urbanitesTogether: An app to foster community for young urbanites
Together: An app to foster community for young urbanites
 
The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile The State of E-Discovery as Social Media Goes Mobile
The State of E-Discovery as Social Media Goes Mobile
 
5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student5 ideas for paying for college as an adult returning student
5 ideas for paying for college as an adult returning student
 
Social media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement onlineSocial media boot camp: "HeyCori"'s tips for successful engagement online
Social media boot camp: "HeyCori"'s tips for successful engagement online
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences

  • 1. Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influences Cori Faklaris | Oct. 19, 2018 Presentation to the 2018 Three Rivers Information Security Symposium (TRISS 2018), Monroeville, Pa., USA @heycori Human-Computer Interaction Institute
  • 2. 2 Cialdini’s ‘Weapons of Influence’ 1. Reciprocation 2. Commitment and Consistency 3. Social Proof 4. Liking 5. Authority 6. Scarcity Robert B. Cialdini. 2001 (4th ed.). Influence. A. Michel Port Harcourt. Cori Faklaris - October 2018 - TRISS 2018 | Page2 @heycori
  • 3. Agenda ✖ About me ✖ About the Social Cybersecurity project ✖ Ideas to apply this work in your context ✖ Next steps for our research Feel free to ask questions at any point. Cori Faklaris - October 2018 - TRISS 2018 | Page3 @heycori
  • 4. Cori Faklaris - October 2018 - TRISS 2018 | Page4 ● PhD student researcher at Carnegie Mellon University ○ Social cybersecurity, Design of information systems, Emerging trends in social media and messaging apps ● M.S., Human-Computer Interaction ○ Indiana University School of Informatics and Computing ○ Thesis: The State of Digital ‘Fair Use’ ● B.S., Journalism, News-Editorial sequence ○ University of Illinois at Urbana-Champaign College of Media ● Social Media Consultant and Editor/Writer ● Previous job titles in news media included: ○ Engagement Producer, Page Designer, Copy Editor, Correspondent, Columnist, Reporter ... ○ “Doer of Things No One Else Wants to Do” (IT, UX :-) About me @heycori
  • 5. 5Cori Faklaris - October 2018 - TRISS 2018 | Page5 @heycori
  • 6. 6Cori Faklaris - October 2018 - TRISS 2018 | Page6 Friend 1, Friend 2, Friends 3 & 4, 6 @heycori
  • 7. 7 Cialdini’s ‘Weapons of Influence’ 1. Reciprocation 2. Commitment and Consistency 3. Social Proof 4. Liking 5. Authority 6. Scarcity Robert B. Cialdini. 2001 (4th ed.). Influence. A. Michel Port Harcourt. Cori Faklaris - October 2018 - TRISS 2018 | Page7 @heycori
  • 8. 1. Reciprocation We desire to repay in kind what someone else does for us. “I’ll scratch your back if you scratch mine.” - English idiom, Latin: quid pro quo 8Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 9. 9 Reciprocation & Cybersecurity … 1. Give a gift that obliges behaviors. a. USB drive containing safe software & apps b. ‘Thank you’ card 2. Frame requests as a “big ask,” followed by the real ask. Cori Faklaris - October 2018 - TRISS 2018 | Page9 @heycori
  • 10. 2. Commitment and Consistency Once we make a choice and take a stand, we feel pressure to live up to that commitment. “How are you? Good, are you willing to donate ...” - the ‘Foot-in-the-door’ sales technique 10Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 11. 11 Commitment and Consistency & Cybersecurity … 1. Ask system users to “please watch out for” mistakes in security protocol. 2. Ask users to sign their names to a public promise to use security tools and practices. Cori Faklaris - October 2018 - TRISS 2018 | Page11 @heycori
  • 12. 3. Social Proof We view a behavior as correct in a given situation to the degree that we can observe others performing it. “Fifty million Americans can’t be wrong ...” - Type of phrase often used in advertising copy 12Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 13. 13 Social Proof & Cybersecurity … 1. Display statistics or facts about security behaviors via a lock screen or new browser tab. 2. Crowdsource security tips, then publicize them to the work group. Cori Faklaris - October 2018 - TRISS 2018 | Page13 @heycori FACT: Carnegie Mellon University has not suffered a breach of payroll systems since adopting 2FA.
  • 14. 4. Liking Our personal affinities are bound up in cooperation and compliance – and vice versa. “Flattery will get you everywhere.” - Mae West, 20th century movie actress - See also “Good Cop, Bad Cop” 14Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 15. 15 Liking & Cybersecurity … 1. Recruit a popular member of a workgroup as a helper and ally for InfoSec initiatives. 2. Set a group goal for security behaviors, with rewards for improvements. Cori Faklaris - October 2018 - TRISS 2018 | Page15 @heycori
  • 16. 5. Authority We have an instinct to obey people who are presented to us as authority figures and/or experts. “The apparel oft proclaims the man.” - Polonius in Hamlet, William Shakespeare 16Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 17. 17 Authority & Cybersecurity … 1. Cite security experts or research to back up why you require a security tool or practice. 2. Train end users to avoid being tricked by fake authorities. Cori Faklaris - October 2018 - TRISS 2018 | Page17 You should be thinking right now: Is this a legitimate business card??? @heycori
  • 19. 6. Scarcity Limiting access to a resource (or seeming to) makes it more desirable. “Don’t wait! Last chance before they’re gone!” - Type of phrase often used in advertising copy 19Cori Faklaris - October 2018 - TRISS 2018 | Page 2 @heycori
  • 20. 20 Scarcity & Cybersecurity … 1. Frame the use of security tools or practices in terms of losses rather than benefits. 2. Avoid erratic enforcement that leads to revoking privileges from end users. Cori Faklaris - October 2018 - TRISS 2018 | Page20 1 in 5 breaches can’t be prevented by implementing 2FA - I need to stay vigilant for hackers! @heycori
  • 21. 21 Cialdini’s ‘Weapons of Influence’ 1. Reciprocation 2. Commitment and Consistency 3. Social Proof 4. Liking 5. Authority 6. Scarcity Robert B. Cialdini. 2001 (4th ed.). Influence. A. Michel Port Harcourt. Cori Faklaris - October 2018 - TRISS 2018 | Page21 @heycori
  • 22. Works in Progress ✖ Psychometric scale to help target end-user interventions by security sensitivity. ✖ “Security score” for end users. ✖ Game apps to simulate social actions and competition around security practices. ✖ Interviews with IT professionals about challenges for workgroups who share accounts and devices. ✖ Browser plugin to make crowd opinions about privacy & security settings observable. Cori Faklaris - October 2018 - TRISS 2018 | Page22 @heycori
  • 23. 23Cori Faklaris - October 2018 - TRISS 2018 | Page23 @heycori Das, Sauvik, "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior" (2017). Dissertations. 982. http://repository.cmu.e du/dissertations/982 “Security Sensitivity” indicates an end user’s degree of receptiveness to advice and to using security tools and best practices in everyday life.
  • 24. Works in Progress ✖ Psychometric scale to help target security interventions by readiness to change. ✖ “Security score” for end users. ✖ Game apps to simulate social actions and competition around security practices. ✖ Interviews with IT professionals about challenges for workgroups who share accounts and devices. ✖ Browser plugin to make crowd opinions about privacy & security settings observable. Cori Faklaris - October 2018 - TRISS 2018 | Page24 @heycori
  • 25. https://sijier.000webhostapp.com/ 25Cori Faklaris - October 2018 - TRISS 2018 | Page25 @heycori
  • 26. Works in Progress ✖ Psychometric scale to help target security interventions by readiness to change. ✖ “Security score” for end users. ✖ Game apps to simulate social actions and competition around security practices. ✖ Interviews with IT professionals about challenges for workgroups who share accounts and devices. ✖ Browser plugin to make crowd opinions about privacy & security settings observable. Cori Faklaris - October 2018 - TRISS 2018 | Page26 @heycori
  • 27. 27Cori Faklaris - October 2018 - TRISS 2018 | Page27 @heycori Try it at https://tinyurl.com/CrowdFBTool
  • 28. Cialdini’s ‘Weapons of Influence’ 1. Reciprocation 2. Commitment and Consistency 3. Social Proof 4. Liking 5. Authority 6. Scarcity Any Questions? Partnership Ideas? You can find me at ● Email: heycori @cmu.edu ● Website: http://corifaklaris.com @heycori

Hinweis der Redaktion

  1. We are looking at how to apply Cialdini et al.’s social influence theory to problems in end-user cybersecurity. Such as, how your close friends influence your actions, or how your larger community or social network influences you.
  2. An example of Cialdini’s “social proof” concept in action is Facebook’s visual cues to which of your “friends” have engaged with a recent post. These social cues nudge user behaviors such as posting more often to get the reward of social approval (and, maybe, nudge offline behaviors as well).
  3. https://sijier.000webhostapp.com/