Exploring the link between human cognition and cybersecurity.

Slides:



Advertisements
Similar presentations
Trustworthy: to have belief or confidence in the honesty, goodness, skill or safety of a person, organization or thing.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Bring Your Own Device This is a boring PowerPoint, but an exciting new opportunity!
for staff in their interactions with children and young people
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Growing up Digital Opportunities and challenges for parents.
Introduction to Network Defense
HOW TO USE TECHNOLOGIES SAFELY. We are students from Nikola Vaptsarov Technical Vocational School in Radomir, Bulgaria. We devote this presentation to.
Information Security Awareness Levels of TAFE South Australia Employees Hong Chan Bachelor of IT ( Honours ) Supervisor: Dr Sameera Mubarak.
Social impacts of the use of it By: Mohamed Abdalla.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
A summary of feedback from service users and carers: Adult Social Care – what does good look like?
G53SEC Computer Security Introduction to G53SEC 1.
Are Doctoral Candidates Switched on to the Impact of Social Media? Dr Heather Doran Winston Churchill Fellow 2015 (Social Media)
ANYTHING THAT GETS INVENTED AFTER YOU’RE THIRTY IS AGAINST THE NATURAL ORDER OF THINGS AND THE BEGINNING OF THE END OF CIVILISATION AS WE KNOW IT …UNTIL.
Evidence-based policing © College of Policing Limited 2013 Nerys Thomas Analysis & Science Programme Manager.
Evidence-based policing © College of Policing Limited 2013 Levin Wheller Principal Research Officer Knowledge, Research and Practice Unit.
PROFILE OF A COMMUNITY COLLEGE STUDENT: Assessing their Barriers (and Ladders) to Success Frank Yunker Fulton-Montgomery Community College Johnstown, New.
Nadine PrescottCarolyn Gelenter Speech and Language TherapistAdvisory Teacher SLCN.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
The East Midlands Science, Technology, Engineering and Maths Awards: The Legacy of a Collaborative Aimhigher Project.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Alain Thomas Overview workshop Background to the Principles Definitions The National Principles for Public Engagement What.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
 To increase the awareness of young people around the process of radicalisation of individuals.  To enable young people to identify and discuss factors/indicators.
International Student Transitions PG Guide Booklets available at: University of Stirling STIRLING GRADUATE SCHOOL.
Surf smart training.
What is Cloud Computing?
Technology and Business Continuity
Early Years Curriculum Information Evening
Goal setting and time management
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Creating your online identity
Cyber Safe – WGC Parents
Developing Software Security Industry Tools
Putting Yourself into Words
Cyber Safe – WGC Wellness Day
SafeSurfing Module 5.
Mt. Horeb I.C. Orientation night
Opening a World of Opportunity
“The most common threat online is cyber-bullying” (CAS)
Digital Technology.
Edexcel GCSE ICT ASSESSMENT INFORMATION
Outreach to Local Transition Centers
AJS 572 Possible Is Everything/snaptutorial.com
AJS 572 Education for Service-- snaptutorial.com.
AJS 572 Teaching Effectively-- snaptutorial.com
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Communicating in Lay Terms
The Q Improvement Lab August 2017.
Sam Dawson Course Tutor 24/1/2015
SMB practice development: Security play
Creating a Cyber Resilient Population
SafeSurfing Module 5 September 2016.
SMB practice development: Security play
Working with parents and carers
Interdisciplinary collaboration between social and computer science
Anatomy of a Large Scale Attack
Bring Your Own Device (BYOD) Parent Information Evening
Law Enforcement & public Health Conference 2018 October 24, 2018
Online Safety: Rights and Responsibilities
WJEC GCSE Computer Science
A Supported Life Exploring opportunities to share extraordinary lives
The National Approach to Professional Learning
Career Development workshop
West Midlands Police response to Cybercrime:
October is National Cybersecurity Awareness Month
Presentation transcript:

Exploring the link between human cognition and cybersecurity. Dr Lee Hadlington Psychology and Technology Research Group.

Who Am I? PhD in Cognitive Psychology in 2005; The irrelevant sound effect (really exciting! Sarcasm doesn’t come through well via PowerPoint). Background in experimental methods, quantitative research methods. Came to DMU in 2006 – spent a number of years sitting around thinking about research ! Accidentally (!) stumbled into cyberpsychology – preliminary research with Defence Science and Technology Lab (DSTL). Then the journey down the rabbit hole began!

My research trajectory First dedicated research project – exploring how digital technology shapes human cognition (DSTL). What did that show me? Limited research and understanding. But there was some research out there. Could I start to pull this together ? Started thinking about this BUT got distracted: Large scale project looking at systematic detection of Insider Threat Second project exploring automated cyberdefence Third project looking at insider threat within business supply chain Fourth project – working with large multinational exploring gamification in the context of cybersecurity. And then got back to thinking about the first bit !

Exploring Cybercognition Started to explore aspects of human cognition in the context of digital technology. Could aspects of addiction to digital technology impact on basic elements of attention ? Simple answer – yes ! Hadlington (2015) – clear link between Internet addiction, mobile phone addiction + cognitive failures. First evidence that problematic use of digital tech – had some bearing on human cognition. Limitations – does internet addiction cause inattention or are those with poor attentional control – precluded to Internet addiction ! Repeated study with Smartphone addiction – guess what – the same findings were apparent!

So, what next ! I got distracted again ! Involved in the East Midlands Police Academic Collaboration. Network Lead – Serious Organised Crime: Cybercrime and Cybersecurity. Aims – to explore susceptibility to cybercrime and examine human factors in Cybersecurity. Began with SMEs (Small Medium Enterprises – those organisations with less that 250 employers) What did this show me ? Well, to be honest, small businesses are really apathetic about cybersecurity (in the main) – UNTIL THEY GET ATTACKED ! Many employees – rely heavily on management and company infrastructure to protect them.

Attitudes to cybersecurity 98% Believed that it was the responsibility of MANAGEMENT to protect the company from Cybercrime. 58% Didn’t know how they could protect the company from cybercrime 55% Didn’t think they had the right skills. 80% Asserted that believed cybercriminals were more advanced than those who were preventing attacks. 84% More could be done to communicate the risks from cybercrime to the organization 48% Didn’t feel confident in being able to detect a cyberattack 44% Wouldn’t know how to report a cyberattack if one happened. 32% Not their responsibility to report a cybercrime within the company

And if you want to be scared! 33% - used their own USB to transfer work data onto. 44% - relied on a friend or colleague to provide them with advice on Cybersecurity. 67% - Used free-to-access public WI-FI 47% - Online Storage Systems to exchange/store personal information. 69% (!) – Used the same password for multiple websites. 40% - Created basic passwords 27% - Shared passwords with Friends and colleagues.

What is the most destructive element in Cybersecurity?

In the meantime Went back to the original premise of ‘Cybercogntion’ Dual purpose term: Describes the cognitive processes we use online. Refers to the potential for digital technology to change or alter cognitive processes. Decided there was enough research out there to bring together in a book …and wrote it! Written as a textbook which is accessible to everyone, irrespective of technical background.

Current Work Embedded volunteer within Local Digital Media Investigators (they make good tea and have cakes!) Focus groups – exploring experiences of frontline staff in the context of cybercrime and cybersecurity. Exploring attitudes and behaviours of younger adults (under 18) in context of cybercrime and cybersecurity. Examining more effective mechanisms of communicating effective information security awareness to everyone. Wider Work: Examining the link between cyberloafing, Internet addiction and Information Security Awareness (In collaboration with Kathryn Parsons, Australian Ministry of Defense – in review) Focus groups – Ipad technology use in the home, 8-9 year olds – they are sneaky !

Where you can find me Email – lhadlington@dmu.ac.uk Twitter - @HadlingtonLee Local bookshop (if they exist!) >