Cyber-crime Science Pieter Hartel & Marianne Junger.

Slides:



Advertisements
Similar presentations
Manual Evaluation: Are we doing what we think we are doing?
Advertisements

Implementation of a Scientific Literacy Project in a Large First Year Biology Class -Fiona Rawle.
Bangladesh European Union Capacity Building for Effective Response Management System Through e-Learning Options A SDC supported project Comprehensive Disaster.
Cyber-crime Science Pieter Hartel. The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three »Do an experiment »Write.
Crime and Cyber-crime Pieter Hartel. Cyber-crime Science 2 Crime Acts or missions forbidden by law that can be punished […], against: »persons (e.g. rape,
WE 640 Welding Production. Welcome to Welding Engineering 640 You Will Find Everything You Need For This Course at:
The Teamwork Handbook Requirements Should be able to be used across a variety of settings or a specific one that you define. Identify your client/audience/end-user.
Designing an Effective Course Curriculum Ponnurangam K (“PK”) Indo-US Workshop on Effective Teaching at College / University Level Feb 10, 2011.
Project Workshops Schedule. 2 Important Points to Note Project Workshops will be Thursday at 1315 in LC 50 These workshops are compulsory for all project.
OEMBA Information Systems Course James R. Coakley PhD, Accounting Information Systems, Utah (1982) “Minor” in Statistics and Computer Science MBA, Utah.
Formative Assessment of Learning Tutors: Nilza Costa & Marta Abelha & Lúcia Pombo Technical Support: Helder Caixinha & Susana Caixinha.
Math 210G Mathematics Appreciation Dr. Joe Lakey website: phone: office: Science Hall 230.
introduction to MSc projects
1 As Class Convenes u Find your team u Pick up your team’s folder; Becoming an Expert u Remove any old work and Class Process Check for Becoming an Expert.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
ISSUES TO CONSIDER IN YOUR PROJECT This is a short presentation from issues discussed in a meeting of MCS3 on Tues 2 nd March 2004.
TA End of Semester Survival Skills Lisa Kelly Center for Teaching October 31 st, 2013.
CSE 564: Computer Security and Privacy Winter 2015 Franzi Roesner
Year 9/10 Parents’ Information Evening 29/6/11. Outline of the Evening Welcome introduction Welcome introduction KS4 Expectations KS4 Expectations KS4.
G53SEC Computer Security Introduction to G53SEC 1.
CS 150 PERSONAL PRODUCTIVITY USING TECHNOLOGY Instructor: Xenia Mountrouidou.
“Knowing Revisited” And that’s how we can move toward really knowing something: Richard Feynman on the Scientific Method.
Software Quality Assurance Activities
1 Building shared instructor and peer support for students projects. Ramón Garrote Tel WebCT – IMPACT 2005 –San Francisco.
MSc conference briefing Mike Spann Project coordinator
New Advanced Higher Subject Implementation Events Computing Science Advanced Higher Course Assessment.
Unit 2 Research Proposal Schedule (Updated) Week 6 2/19-Intro to research proposals & primary research Week 7 2/24-Interviews & Observations 2/26-Surveys.
Course Information Sarah Diesburg Operating Systems COP 4610.
Science of Safety and Identifying Defects CUSP 4 MVP-VAP Content Call, Module #2.
CMPGN3007 & CMPGN3008 BSc Project Dr T.A.Etchells BSc Project Tutor
Click to start. Getting started The SURE Guides are intended to help you both produce, and use, an evidence-based policy brief. This overview will show.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Web Fundamentals (HTML and CSS)
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
Mr C Johnston ICT Teacher G041: How Organisations Use ICT Introduction To The Unit.
Doctoral Training Workshops An interdepartmental programme organised by MCT for the Research Careers Development Team Organised by Sue Oreszczyn, Dave.
SE 521 Dr. Lola Taylor Unit one. INTRODUCTION This week's seminar will focus on getting acquainted and understanding the expectations for the course.
LECTURER-TASNUVA CHAUDHURY (TCY) TERM PROJECT SPRING’16 MGT 321: Organizational Behavior.
HRM 498 ASSIST Teaching Effectiverly/hrm498assist.com FOR MORE CLASSES VISIT
Applying Laurillard’s Conversational Framework to Blended Learning Blogging and Collaborative Activity Design R Papworth, R Walker & W Britcliffe E-Learning.
Phishing Marianne Junger Cyber-crime science 1 Wouter Bakker Berber Bokkes Shannon Cleijne Wouter Horlings Koen Zandberg.
COMP6043 w5 Surveys COMP6043 Week 5 Survey Systems November 2009 Dr Su White.
Foundation Year Routes to Success Part III - Sustaining Success Su White Semester 2 Week1 - Context These slides in Edshare
Reviewing [Ros07] T. Roscoe. Writing reviews for systems conferences. Technical report, ETH Zürich, Mar 2007.
CJA 314 Week 3 Individual Examining Theory Paper To purchase this material link Week-3-Individual-Examining-Theory-Paper.
ECO 561 Week 5 Peer Review NEW To purchase this material click below link NEW/ECO-561-Week-5-Peer-Review-NEW For.
IT 244 Week 4 Cyber Crime To purchase this material link Week-4-Cyber-Crime For more courses visit our website.
1st Steering Committee Meeting activities from WP3 –
Final Year Project Guidelines
Irish Survey of Student Engagement (ISSE) Results 2016
Course Information Mark Stanovich Principles of Operating Systems
1st Steering Committee Meeting activities from WP3 –
CMGT 582 Competitive Success-- snaptutorial.com
CMGT 582 Competitive Success/tutorialrank.com
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- snaptutorial.com
CMGT 582 Education for Service-- tutorialrank.com.
CMGT 582 STUDY Education for Service--cmgt582study.com.
CMGT 582 Teaching Effectively-- snaptutorial.com
Andy Wang Operating Systems COP 4610 / CGS 5765
Workshop A – HN Enhancement Project: A Practitioner’s Perspective
Andy Wang Operating Systems COP 4610 / CGS 5765
Human Computer Interface
Welcome to Physics 1D03 !.
Software Usability Course notes for CSI University of Ottawa
Presentation of the Nordplus Higher education project
Reminders National Moderator Reports
The basics of Social Science Research Lecture 3
Technology Revision 2019.
Presentation transcript:

Cyber-crime Science Pieter Hartel & Marianne Junger

The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three (for 5 EC) »Do an experiment »Write a paper »Review other papers »Present the paper at a conference Cyber-crime Science 2

Team Lecturers »Prof dr Pieter Hartel (computer science) »Prof dr Marianne Junger (social science) Teaching assistants »Dr Lorena Montoya (TU Delft) »Jan Willem Bullée (U Twente) 3 Cyber-crime Science

Contents Theory »What is Crime and Cyber-crime? »Technology (ICT) creates opportunity »Crime Science is evidence based »Opportunity reduction works Practice »How to do an opportunity reducing experiment in this course? »Report on the evidence. Cyber-crime Science 4

Crime and Cyber-crime Crime »Behaviour commonly considered harmful, serious Disorder »Lack of order, broader than crime Cyber-crime »ICT used as a tool, target or place 5 [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov Cyber-crime Science

Porn on video billboard Cyber-crime Science 6

Cyber-crime is big business Estimate (B$)Year Anti-virus Patching12010 ISP clean-up User clean-up Defence firms Law enforcement [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun Cyber-crime Science

ICT creates opportunity Offenders know that they run little risk Targets often don’t understand the risks Cyber disinhibits Cyber-crime Science 8

Crime Science Five principles of opportunity reduction 1.Increase effort 2.Increase risks 3.Reduce rewards 4.Reduce provocation 5.Remove excuses Measure the effect of the intervention Cyber-crime Science 9

Opportunity reduction works 10 [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul ACM. Clicked on link (%) Cyber-crime Science

Practice Cyber-crime Science 11

12 Question Is an intervention as coursework feasible? »Yes, but it’s hard work »… and it can be a lot of fun Check out what 43 teams have done in previous years [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul Cyber-crime Science

13 Interactive trash cans, N=24 Cyber-crime Science

14 Course Schedule team+ topic Draft research proposal Final proposal & slide Experiment & draft paper final paper review & slides (5 weeks) (6 weeks) (9 weeks) PII form Reviewing Research Methods Presentations Ethical committee APA paper writing Present ideas Present again Cyber-crime Science

Help is at hand What? »Clinics: get feedback or discuss »F2F or via Skype When? »Sign up via the doodle to get a timeslot »16/17 and 22/24 February, and 14/16 March More details on website Cyber-crime Science 15

16 Examination By coursework only »Quality of the paper »Quality of the reviews »Quality of the presentations You will be marked by your peers »And you may not like it… »But the lecturers and TAs are the moderators Cyber-crime Science

17 FAQ Team topic (week 1) »What is the crime/disorder and how will you prevent it? Draft proposal (week 3) »What are the risks for the researchers and the subjects? »What is the control group? Final draft proposal (week 5) »Does my design work? Do a pilot! Draft paper (week 14) »Can someone else repeat the experiment? Final paper (week 18) »Are the results statistically significant? Cyber-crime Science

18 What to do next? 1.Sign up by mailing Pieter Hartel 2.Complete and sign the PII form now 3.Social science training : 0.5 bonus point 4.Write 1 A4 Research proposal with: »Background »Method »Three key references »Appendix: Checklist Ethical Committee 5.For the forms and deadlines see: Cyber-crime Science

Project ideas Discussion Cyber-crime Science 19