SlideShare a Scribd company logo
1 of 5
Social Behavioral and Economic
 Sciences (SBE) in Secure and
Trustworthy Cyberspace (SaTC)
        Peter Muhlberger
        Program Director
           SBE / SaTC
Motivation
• Government, industry, scientists, cybersecurity
  people worried about American vulnerabilities
  – Estimates of home user machines that are
    compromised: 15-50%
  – Estimated amount of corporate information hacked
    each day: petabytes
  – Anticipated vulnerability to cyberattack by state
    actors: e.g., (unsophisticated) Iran cyber attacks at
    multiple U.S. banks, including Capital One
• Greater cybersecurity is a pressing national need.
Why SBE sciences?
•   Increasing recognition by government officials and computer scientists that
    cybersecurity is not merely a technical problem
     – Attackers: intentional agents
          •   Look for and find vulnerabilities
     – Users: intentional and imperfect agents
          •   Intentions & incentives / motivation: insider threat
          •   Intentions & incentives: trying to get work done in competitive environments, often don’t make time
              for arcane issues
          •   Numerous limitations in cognitive processes
•   Addressing cybersecurity issues necessarily involves addressing the human
    component of these issues
•   SBE sciences offer a rigorous, scientific approach to developing generalizations
    about human motivation, behavior, and cognition
     – Such an approach should be more effective than purely applied approaches: allows
       abstraction, generalization; allows understanding causal mechanisms; allows prediction
     – Admittedly, the capacity and accuracy of generalization and prediction in the social sciences is
       not like in physics, but few things are
     – Still, we can do better than hit or miss, purely applied approaches
     – Can tap enormous literatures and apply these in cybersecurity settings, perhaps with new
       twists
SBE Challenges
• Computer scientists and govt officials not familiar
• Particularly not familiar with non-economic approaches
   – NITRD: Networking and Information Technology Research and
     Development Subcommittee has defined 5 Cybersecurity R&D Themes
       • Only one of these is social science and calls for research in cybereconomic
         incentives
• A broad swath of the social sciences could be brought to bear,
  including research in economic incentives and systems, cognition,
  motivation, organizations, political actors, social networks,
  criminology and much more.
   – Behavioral economics: Already aware of ‘non-economic’ approaches
• A challenge to social scientists but also computer scientists: to
  know enough about each other’s work to see what might prove
  highly fruitful if strands of research were combined.
• Another challenge: working together while meeting career goals.
Goals for Today
• Build awareness of what is going on in the
  social sciences and computer sciences
• Identify what might prove valuable to your
  research
• Make connections that might eventually grow
  into collaborations

More Related Content

What's hot

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 securityOkonkwo uzonna
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issuesNickardo Salmon
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 

What's hot (20)

Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Chi.talk
Chi.talkChi.talk
Chi.talk
 
Social engineering
Social engineering Social engineering
Social engineering
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Ethical and legal issues
Ethical and legal issuesEthical and legal issues
Ethical and legal issues
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 

Similar to Social Behavioral and Economic Sciences (SBE) Address Human Factors in Cybersecurity

Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Riskshshap
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysisu3037519
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...Ansgar Koene
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramTyrone Grandison
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Mike Kujawski
 
Open analytics social media framework
Open analytics   social media frameworkOpen analytics   social media framework
Open analytics social media frameworkOpen Analytics
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxbalewayalew
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...Mohanumar S
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Philip Bourne
 
Data Science-1 (1).ppt
Data Science-1 (1).pptData Science-1 (1).ppt
Data Science-1 (1).pptSanjayAcharaya
 

Similar to Social Behavioral and Economic Sciences (SBE) Address Human Factors in Cybersecurity (20)

Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Risk
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Aspa ai webinar
Aspa   ai webinarAspa   ai webinar
Aspa ai webinar
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Open analytics social media framework
Open analytics   social media frameworkOpen analytics   social media framework
Open analytics social media framework
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Chapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptxChapter -6- Ethics and Professionalism of ET (2).pptx
Chapter -6- Ethics and Professionalism of ET (2).pptx
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING                          ...
Unit 5-GE 6075 – PROFESSIONAL ETHICS IN ENGINEERING ...
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Introduction to Computing Logic Formulation
Introduction to Computing Logic FormulationIntroduction to Computing Logic Formulation
Introduction to Computing Logic Formulation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015
 
Data Science-1 (1).ppt
Data Science-1 (1).pptData Science-1 (1).ppt
Data Science-1 (1).ppt
 

More from Amy Lenzo

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6Amy Lenzo
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceAmy Lenzo
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAmy Lenzo
 
Dan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeDan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeAmy Lenzo
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber CafeAmy Lenzo
 
SaTC Cyber Cafe Jeremy Epstein
SaTC Cyber Cafe  Jeremy EpsteinSaTC Cyber Cafe  Jeremy Epstein
SaTC Cyber Cafe Jeremy EpsteinAmy Lenzo
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social FieldsAmy Lenzo
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emergingAmy Lenzo
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Amy Lenzo
 
Participant list
Participant listParticipant list
Participant listAmy Lenzo
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1Amy Lenzo
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café ConversationAmy Lenzo
 

More from Amy Lenzo (13)

Graphics session 6
Graphics session 6Graphics session 6
Graphics session 6
 
Visual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective IntelligenceVisual Capture: Reflecting Collective Intelligence
Visual Capture: Reflecting Collective Intelligence
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 
Dan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber CafeDan Boneh - SaTC Cyber Cafe
Dan Boneh - SaTC Cyber Cafe
 
Stefan Savage Cyber Cafe
Stefan Savage Cyber CafeStefan Savage Cyber Cafe
Stefan Savage Cyber Cafe
 
SaTC Cyber Cafe Jeremy Epstein
SaTC Cyber Cafe  Jeremy EpsteinSaTC Cyber Cafe  Jeremy Epstein
SaTC Cyber Cafe Jeremy Epstein
 
Transforming Social Fields
Transforming Social FieldsTransforming Social Fields
Transforming Social Fields
 
Wisdom emerging
Wisdom emergingWisdom emerging
Wisdom emerging
 
Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2Level 1 Learnign Program- SlideShow2
Level 1 Learnign Program- SlideShow2
 
Participant list
Participant listParticipant list
Participant list
 
Level One Online - SlideShow1
Level One Online - SlideShow1Level One Online - SlideShow1
Level One Online - SlideShow1
 
Just Water
Just WaterJust Water
Just Water
 
The World Café Conversation
The World Café ConversationThe World Café Conversation
The World Café Conversation
 

Social Behavioral and Economic Sciences (SBE) Address Human Factors in Cybersecurity

  • 1. Social Behavioral and Economic Sciences (SBE) in Secure and Trustworthy Cyberspace (SaTC) Peter Muhlberger Program Director SBE / SaTC
  • 2. Motivation • Government, industry, scientists, cybersecurity people worried about American vulnerabilities – Estimates of home user machines that are compromised: 15-50% – Estimated amount of corporate information hacked each day: petabytes – Anticipated vulnerability to cyberattack by state actors: e.g., (unsophisticated) Iran cyber attacks at multiple U.S. banks, including Capital One • Greater cybersecurity is a pressing national need.
  • 3. Why SBE sciences? • Increasing recognition by government officials and computer scientists that cybersecurity is not merely a technical problem – Attackers: intentional agents • Look for and find vulnerabilities – Users: intentional and imperfect agents • Intentions & incentives / motivation: insider threat • Intentions & incentives: trying to get work done in competitive environments, often don’t make time for arcane issues • Numerous limitations in cognitive processes • Addressing cybersecurity issues necessarily involves addressing the human component of these issues • SBE sciences offer a rigorous, scientific approach to developing generalizations about human motivation, behavior, and cognition – Such an approach should be more effective than purely applied approaches: allows abstraction, generalization; allows understanding causal mechanisms; allows prediction – Admittedly, the capacity and accuracy of generalization and prediction in the social sciences is not like in physics, but few things are – Still, we can do better than hit or miss, purely applied approaches – Can tap enormous literatures and apply these in cybersecurity settings, perhaps with new twists
  • 4. SBE Challenges • Computer scientists and govt officials not familiar • Particularly not familiar with non-economic approaches – NITRD: Networking and Information Technology Research and Development Subcommittee has defined 5 Cybersecurity R&D Themes • Only one of these is social science and calls for research in cybereconomic incentives • A broad swath of the social sciences could be brought to bear, including research in economic incentives and systems, cognition, motivation, organizations, political actors, social networks, criminology and much more. – Behavioral economics: Already aware of ‘non-economic’ approaches • A challenge to social scientists but also computer scientists: to know enough about each other’s work to see what might prove highly fruitful if strands of research were combined. • Another challenge: working together while meeting career goals.
  • 5. Goals for Today • Build awareness of what is going on in the social sciences and computer sciences • Identify what might prove valuable to your research • Make connections that might eventually grow into collaborations