Social Science Experiment Jan-Willem Bullee. 2 Cyber-crime Science Background Effectiveness of authority on compliance We can get some of the answers.

Slides:



Advertisements
Similar presentations
Health and Safety Executive Health and Work Please feel free to use the information provided in this presentation in your own presentations. Where appropriate,
Advertisements

IBD PATIENT PANELS IBD Patient Panel Surveys Why Carry Out a Survey?  Bring about improvements in part of a service that you think may not up to standard.
Increased Likeability Evoked in the Context of a Disabling Condition By: Greg Sapp.
Nov Home-Start Listening to Families Violet Greaves, Regional Consultant, North Wales.
Child/Youth Protection Policies and Procedures. Let the little children come to me, and do not hinder them, for the kingdom of heaven belongs to such.
Be A Mentor, Inc. Orientation to Mentoring 1260 B Street, Suite 375 Hayward, CA (510)
Research Ethics The American Psychological Association Guidelines
The Dynamics of Persuasion There are six universal principles of influence that operate regardless of the venue –Whether asked to buy a car, volunteer.
Chapter 14: Usability testing and field studies. 2 FJK User-Centered Design and Development Instructor: Franz J. Kurfess Computer Science Dept.
Copyright © 2009 Pearson Education Canada2-1 Chapter 2: Child Development 2.1 Doing Child-Development Research 2.2 Child-Development Research and Family.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
Research Methodologies in Allied Health SAHP 418/518 Research Planning Sandra Gunselman, Ph.D.
James Tam Evaluating Interfaces With Users Why evaluation is crucial to interface design General approaches and tradeoffs in evaluation The role of ethics.
Can they have a conversation? Evaluation of a Social Skills Curriculum in a Youth Development Program.
Choosing Your Primary Research Method What do you need to find out that your literature did not provide?
Ethics in Business Research
Methods of Psychology Hypothesis: A tentative statement about how or why something happens. e.g. non experienced teachers use corporal punishment more.
Desia Dunn Elaboration Likelihood Model (Chapter 5- Persuasion)
Requirements, cont. …and a word on Ethics. Project Part 1: Requirements Gather data using one or more techniques Learn about environment, users, tasks,
TASER ® Risk Avoidance Program (RAP) MICHIGAN MUNICIPAL RISK MANAGEMENT AUTHORITY.
The Power of Persuasion and IT Training ILTA | User Support Peer Group June 4th, 2009.
Research Methods Resource: Text Chapter 2. What is the scientific method?  a set of principles and procedures that are used by researchers to develop.
Surveys & Questionnaires. Survey A gathering of a sample of data or opinions considered to be representative of a whole.
Do They Say Thank You? Evaluation of a Social Skills Curriculum in a Youth Development Program.
Ms. Carmelitano RESEARCH METHODS EXPERIMENTAL STUDIES.
STUDY DESIGN: PILOT STUDIES Charles Flexner, MD Johns Hopkins University.
Research PHE 498. Define Research Research can be considered as systematic inquiry: A process that needs to be followed systematically to derive conclusions.
SUNY Oswego Human Subjects Committee Last Revised 10/28/2011.
Office of Research Integrity and Compliance March 2011.
Science Fair Research Plan
SUNY Oswego Human Subjects Committee Last Revised 10/28/2011.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
Welcome to STEM Aeronautics Camp July , 2013.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
Conformity and Obedience. CONFORMITY “ The tendency to change our perceptions, opinions, or behaviour in ways that are consistent with group norms” (Brehm,
Ways of Collecting Information Interviews Questionnaires Ethnography Books and leaflets in the organization Joint Application Design Prototyping.
RECIPROCITY SCARCITY AUTHORITY COMMITMENT LIKING SOCIAL VALIDATION SIX UNIVERSAL INFLUENCE PRINCIPLES.
Compliance Type of social influence in which a person changes attitudes or behavior in response to another’s direct request Six principles involved in.
Business and Management Research
DODAC and DSaRM Advisory Committee August 1, 2007 Pregnancy Registry and Root Cause Analysis Cynthia Kornegay, Ph.D. Division of Drug Risk Evaluation Office.
Research Strategies. Why is Research Important? Answer in complete sentences in your bell work spiral. Discuss the consequences of good or poor research.
What does peer review involve? Here are some of the aspects of the research that are scrutinised: Originality of the research The appropriateness of the.
Marketing Research Approaches. Research Approaches Observational Research Ethnographic Research Survey Research Experimental Research.
Copyright © Allyn & Bacon 2008 Intelligent Consumer Chapter 14 This multimedia product and its contents are protected under copyright law. The following.
Happy Wednesday! You will have a little time to put your posters together.
Psychology As Science Psychologists use the “scientific method” Steps to the scientific method: - make observations - ask question - develop hypothesis.
5-6-1 Unit 6: Ethical considerations After completing this unit, you should be able to: Understand the basic ethical principles of working with.
© 2000 Pearson Education Canada Inc., Toronto, Ontario The Ways and Means of Psychology Lecture # 2 Measuring behaviour and scientific methodology.
Psychological Research Strategies Module 2. Why is Research Important? Gives us a reliable, systematic way to consider our questions Helps us to draw.
EXPERIMENTAL DESIGN PROJECT Are Flintstone Vitamins Pediatricians #1 choice for children’s chewable vitamins? Journey Malmborg | Science Goddess| Period.
PSYCHOLOGY UNITS 1 & 2 ORIENTATION DAY 2015/2016.
Groups & Obedience The Milgram Experiment
Extract from the manuscript guide lines of articles for the data base All kinds.
Usability Evaluation or, “I can’t figure this out...do I still get the donuts?”
Monday, June 23, 2008Slide 1 KSU Females prospective on Maternity Services in PHC Maternity Services in Primary Health Care Centers : The Females Perception.
College Students’ Behaviors, Perceptions, Beliefs, and Attitudes Regarding Tanning Bed Use Fawna M. Playforth, BS; Laurie J. Larkin, PhD; & Laurel A. Mills,
Jette hannibal Internal assessment Experimental research.
HR101 Psychology in Organisations Tutorial 1 Week 4 & Week 5 Breda-Ann O’Toole.
Public Health Data Sharing: A New Opportunity for UA Faculty & Staff
Social Psychology.
Social Influence: Compliance
Compliance and conformity
Social Influence: - a fact of daily life. - each day, we are exposed too many different forms of social influence – efforts by others to change our attitudes,
Research Ethics Matthew Billington
Human Subjects and Ethics Review
קונפורמיות, ציות והענות
J Geetha Madhuri Journal of Organizational Behavior 2017
Presented by Elizabeth Kunkel Member Service Trainer
TRACE INITIATIVE: Confidentiality, Data Security, and Procedures for Protocol Violation or Adverse Event.
Presentation transcript:

Social Science Experiment Jan-Willem Bullee

2 Cyber-crime Science Background Effectiveness of authority on compliance We can get some of the answers from »Literature (Meta-analysis) »Attacker stories/interviews But the answers are inconclusive »Different context »Hard to measure human nature »Difficult to standardize behaviour.

3 Cyber-crime Science Principles of Persuasion Authority »More likely to listen to an police officer Conformity »Peer pressure Commitment »Say yes to something small first Reciprocity »Return the favour Liking »People like you and me Scarcity »Wanting the ungettable

5 Cyber-crime Science Literature on Authority Classical Milgram Shock Experiment »66% full compliance [Mil63] S. Milgram. Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371–378.

5 Cyber-crime Science Introduction Key Experiment Get something from an employee Equal to password or PIN Intervention Impersonate

5 Cyber-crime Science Experimental Setup Design Intervention »Written memo »Key-chain »Poster R1R1 XO R2R2 O

5 Cyber-crime Science Hypotheses H 0 : Intervention and Control comply equally H 0 : Authority and Control comply equally H 0 : Effect of Authority on compliance

5 Cyber-crime Science Results 351 rooms targeted »N=118 (33,6%) populated Demographics Targets »Female: 24 (20%) Male: 94 (80%) »M age = 34, range (23-63) years Overall compliance distribution »52.5%/47.5%

5 Cyber-crime Science Results

5 Cyber-crime Science Results Intervention distribution »60%/40% H 0 : Intervention and Control comply equally »χ²-test »Hypothesis rejected

5 Cyber-crime Science Results Authority distribution »≈50/50 H 0 : Authority and Control comply equally »χ²-test »Hypothesis accepted

5 Cyber-crime Science Results Effect of authority »Logistic Regression »Employees that did not get the intervention are 2.84 times more likely to give their key away Intervention Give Key

5 Cyber-crime Science Results Effect of authority »Logistic Regression »Employees that did not get the intervention are 2.84 times more likely to give their key away »Authority: No effect Intervention Authority Give Key

5 Cyber-crime Science Results Comments: »“Great test!” “Cool Experiment” “Interesting study” »“I had doubts” “Having an keychain is important” »“Suspicious looking box” »“Guy in suit looked LESS trustworthy” »“Asked for my ID” »“Trusted me since I looked friendly” »“I feel stupid” »“I didn’t wanted to give the key, but did it anyway”

5 Cyber-crime Science Take Home Message Children, animals, people never react the way you want. Limited availability in July and August You are not important for others …unless you want to break the system 1/3 of employees works on a Wednesday in September 2.84 times higher odds to get key if no intervention

10 Cyber-crime Science Charging Mobile Phone

10 Cyber-crime Science Charging Mobile Phone What are the security considerations of the users of a public mobile phone charger? »What is the use rate of the device (per number of people at that location per hour), »Why do people use (or not) the system? »How do the safety perceptions of the current users differ between the former users and the non-users. You are the researchers!

10 Cyber-crime Science Crime Prevention CPTED Framework (Crime Prevention Through Environmental Design) Activity Support »Eyes on the street »Unfortunately: also provides opportunity »Overall crimes are reduced by increasing activity [Coz05] Cozens, P. M., Saville, G., & Hillier, D. (2005). Crime prevention through environmental design (CPTED): a review and modern bibliography. Property management, 23(5),

10 Cyber-crime Science Hypotheses H 0 : Cabinets in busy and quite areas are equally used. H 0 : Cabinets with surveillance (e.g. service desk) and with no surveillance are equally used. H 0 : Cabinets in lunch hours (e.g. lunch) and lecture hours are equally used.

11 Cyber-crime Science Our Design Researchers: You (Student) Target: Fellow Students and Employee Goal: Observe »Observe and interview people Interface: Face 2 Face Count people and short questionnaire

12 Cyber-crime Science Method : Our design 2 experimental conditions »Users of the system / non users of the system 6 locations »Experimental: Bastille, Hal-B, Horst and Spiegel »Control: ITC (city center), Ravelijn

13 Cyber-crime Science Method : Our procedure Subjects from the experimental building »Teams of 1 researcher »One minute count: the people that pass-by »Approach users of the system Subjects from the control building »Teams of 2 researchers »Interview people walking in the area More details on the course-site

15 Cyber-crime Science What to do Before Tuesday 9 September »Register in the Doodle On 10, 17 (and 24) September »09: :50 Briefing at ZI4047 »Travel to location »10: :45 Experiment »12: :30 Break and travel »13: :45 Experiment part 2

16 Cyber-crime Science What to do We have permission to do this only at »UT: Bastille, Hal-B, Horst, Ravelijn, Spiegel and ITC Enter your data in SPSS »Directly after the attack »Come to me ZI4047 Earn 0.5 (out of 10) bonus points

17 Cyber-crime Science Ethical issues Informed consent not possible Zero risk for the subjects Approved by facility management Consistent with data protection (PII form) Approved by ethical committee, see

18 Cyber-crime Science Conclusion Designing research involves: »Decide what data are needed »Decide how to collect the data »Use validated techniques where possible »Experimental Design, pilot, evaluate and improve »Training, data gathering

19 Cyber-crime Science Further Reading [Cia09] R. B. Cialdini. Influence: The Psychology of Persuasion. Harper Collins, [Gre96a] T. Greening. Ask and ye shall receive: a study in 'social engineering'. SIGSAC Rev., 14(2):8-14, Apr [Hof66] C. Hofling, E. Brotzman, S. Dalrymple, N. Graves, and C. Pierce. An experimental study in Nurse-Physician relationships. J. of Nervous & Mental Disease, 143(2): , Aug 1966.