Assessing Home Internet Users’ Demand for Security Brent Rowe, RTI International Dallas Wood, RTI International.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Regulating Laptops in the Classroom Presented by the CET Undergraduate Fellows James Green Michelle Tomkovicz Joseph Dombrosky.
Credit and Credit Cards
Rural Economy Research Centre Modelling taste heterogeneity among walkers in Ireland Edel Doherty Rural Economy Research Centre (RERC) Teagasc Department.
ENROLLED STILL UNINSURED Voices from the Newly- Enrolled And Still Uninsured A Survey about the Affordable Care Act’s First Open Enrollment Period June.
Jeanette Rodriguez Instructional Technology Practicum EDTC 3332 March 11, 2012.
Delaware’s Plan to Implement Project CORE
Basic Research Methods CSE EST ISE 323 Spring 2012 Tony Scarlatos.
The Role of Quitlines in Comprehensive Tobacco Cessation: Where are We Now; Where are We Going; and How do We Get There? Tamatha Thomas-Haase, MPA Manager,
Sign up to Safety? Welcome to the webinar for Safety Improvement Plans You will be muted on entry so we reduce background noise.
Internet Quarantine: Requirements for Containing Self- Propagating Code David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage.
Basic Business Statistics, 10e © 2006 Prentice-Hall, Inc. Chap 9-1 Chapter 9 Fundamentals of Hypothesis Testing: One-Sample Tests Basic Business Statistics.
(Geneva, Switzerland, September 2014)
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Use and Usefulness of E-journals: a Case study of Research Scholars Dr. V. Chandrakumar Senior Lecturer Department of Information Science University of.
Presented by Yeshwanth Boppana Sowmya Nagubadi. overview Introduction SL and WOW Virtual Laboratory Experiments Observational Social and Economic Science.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureSurf Protect your users when surfing the Internet.
Estimating the Market for Internet Service Provider-Based Cyber Security Solutions Brent Rowe – RTI International Doug Reeves – NC State University Dallas.
CYBERSURF TELECOMMUNICATIONS. The company Founded in 1994 Headquarters is in Ottawa, Canada Industry: Internet Company Size: employees - 80% of.
Business and Management Research
Confidence Intervals and Hypothesis Testing - II
1 Core Concepts: CDC Ethics Hypothesis Human subjects Prevalence rate Person, place, and time Surveillance Survey questions Lessons: 1-1 Introduction to.
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
WA State RCL Trainings March 2013 Martha Egan The Coordinating Center Developing a Comprehensive Housing Assessment.
@ 2012 Wadsworth, Cengage Learning Chapter 11 The Ecology of the Experiment: The Scientist and Research Participant in Relation to Their
January 2004 Internet Use and Broadband Adoption in Taiwan: An Overview Report January 2004 Dr. Te-Hsin Liang Associate Professor Dep’t of Statistics Information.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
MAJOR EXPENDITURES: HOUSING, TRANSPORTATION AND FOOD Advanced Level.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Nonprofitfinancefund.org ©2009 Nonprofit Finance Fund.
1 Road Safety Regional Meeting September 2010 Phnom Penh, Cambodia Peer Educator Network in school Strategy.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Testing of Hypothesis Fundamentals of Hypothesis.
ANALYTICS IN HIGHER EDUCATION: PROGRESS AND PROMISE July 2012 Susan Grajek, PhD Vice President, EDUCAUSE.
Environmental Economics Class 4. Valuing the Environment: Methods Methodologies available for quantifying benefits and costs. Valuation techniques available.
Statistics for Managers Using Microsoft Excel, 4e © 2004 Prentice-Hall, Inc. Chap 8-1 Chapter 8 Fundamentals of Hypothesis Testing: One-Sample Tests Statistics.
Copyright © 2009 Pearson Addison-Wesley. All rights reserved. Chapter 3 Valuing the Environment: Methods.
INTERNET SAFETY FOR KIDS
Measuring the impact of Technology on Quality of Services and Operations in an Academic Library Ashok Kumar Sahu Senior Librarian, IIMT Gulam Rasul Asst.
Small Water Utilities Improvement and Financing Project Leila H. Elvas Country Team Leader WSP Philippines.
McGraw-Hill/Irwin © 2004 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 3 Designing the Sample.
Parental Involvement in Children’s Social Networking Activities.
1 Online Student Satisfaction & Adult Student Perceptions RESEARCH RESULTS AND LESSONS LEARNED Academic Affairs Assessment Symposium.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
The Effect of Music Piracy on CDs Purchases Siwat Auampradit.
University of Wisconsin-Eau Claire Andrea C. Privratsky, M.S.E., William Frankenberger, Ph.D. Teacher Attitudes on the use of the Responsive Classroom.
Early Detection of DDoS Attacks against SDN Controllers
Measuring Time Preference and the Elasticity of Intertemporal Substitution with Web Surveys Miles S. Kimball, Claudia R. Sahm and Matthew D. Shapiro October.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Welcome to…. The Boat Ramp Information Open Day Thank you for coming along. We are here to answer your questions.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
A view on implications of the White Paper and Draft Bill for local voluntary Organisations Jon Burke, NAVCA 1/10/12.
[Presentation location] [Presentation date] (Confirm ABT logo) Building Bridges and Bonds (B3): An introduction.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Information Technology Acceptable Use An Overview
Darrell H. S. Tan1, Jayoti Rana1, Shawn Fowler2, Trevor A
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Network Components Network Interface Card (NIC) Hub and Switches
BACKGROUND AND OBJECTIVES
Home Computer Security
Introduction to Lesson 6 Challenging assumptions
Division of Long-Term Services and Supports
Mobile phones A mobile phone is a device which uses radio signal to reach a wide area without having to use a physical connection to a network. These devices.
The adult social care workforce in England - NAO perspective Aileen Murphie: Director MHCLG/LG VFM April 2019.
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Streamline your move to the cloud
Presentation transcript:

Assessing Home Internet Users’ Demand for Security Brent Rowe, RTI International Dallas Wood, RTI International

Study Sponsor The Institute for Homeland Security Solutions (IHSS) – a research consortium funded by the U.S. Department of Homeland Security ( IHSS was established to conduct applied research in the social and behavioral sciences to address a wide range of homeland security challenges

ISP-based Security Solutions ISPs are in prime position to observe internet traffic and quarantine infected users (van Eeten, 2010) but Few ISPs actually respond to signs of infection or misbehavior (Arbor Networks, 2009). Many policies have been proposed to encourage ISPs to pursue more active roles in security (Lightman & Posner, 2004; Moore, 2010; Clayton, 2010).

Costs to Home Internet Users ISP-led security solutions have the potential to impose at least three kinds of costs on home internet users: 1.Increases in the cost of internet access; 2.time spent complying with ISP-determined security requirements; and 3.limits on their internet access.

Research Questions 1.Quantify Home Internet User preferences using discrete choice experiments (n=3,635); 2.Explore Home Internet User WTP for changes in individual ISP security package features; 3.Explore Home Internet User WTP for hypothetical security packages.

Methodology: Discrete Choice Experiments A stated preference survey method that uses “choice experiments” to assess individuals’ preferences for specific goods, services, or polices. Experiments ask individuals to choose between two or more hypothetical goods/services/polices. Each differing along several characteristics or “attributes”.

Attributes: ISP Security Strategies 1.Pay Additional Monthly Fee – $4 per month – $7 per month – $12 per month 2.Spend Time Complying with ISP security requirements – 0.5 hours per month – 1 hour per month – 3 hours per month 3.Allow ISPs to Restrict Subscriber Access to the Internet – Never – Restrict usage to certain functions/websites if user is infected w/malware – Entirely cut-off internet access if infected user is infected w/malware

Attributes: Cyber Security Outcomes 1.Reduced risk of your computer slowing down or crashing – Not Reduced – Somewhat Reduced – Greatly Reduced 2.Reduced risk of your identity being stolen – Not Reduced – Somewhat Reduced – Greatly Reduced 3.Reduced risk to other individuals and business from your insecurity – Not Reduced – Somewhat Reduced – Greatly Reduced

Example Choice Experiment Option AOption B ISP Strategies to Improve Security Adding a fee to your bill to provide security services to Internet subscribers $4 per month$7 per month Requiring you and other Internet subscribers to comply with security requirements and training 0 hours per month Limiting Internet access for you or other subscribers who show signs of malicious or illegal activity ISP can never limit your access to the Internet Cyber Security Outcomes Reduced risk of your computer slowing down or crashing Greatly Reduced Reduced risk of your identity being stolen Not Reduced Reduced risk to other individuals and business from your insecurity Not ReducedGreatly Reduced

Random Utility Model We only observe the choices respondents make. To quantify preferences, we need to make assumptions about respondent utility function. u jt = v jt (X jt ) + ε jt, j = 0, 1, 2, t = 1,….,7 Where v is deterministic component of utility that depends on vector of attribute levels X jt and ε jt is a random error.

Regression Model to Quantify Preferences

Research Question 1: Quantified Preferences

Home Internet Users prefer: – Smaller monthly fees – Less time complying with security requirements – Not having their internet connection interrupted – Great reductions in cyber security risks

Research Question 2: WTP for ISP Security Features Estimated WTP ($/month) 95% Confidence Interval Time Spent Complying with ISP Security Requirements: WTP to avoid 1 hour of time complying with security requirements 0.73[0.57 to 0.92] Limiting Internet Access: WTP to avoid ISPs being able to entirely cut-off internet access 4.32[3.72 to 4.92] Risk of Computer Slowing Down or Crashing: WTP to greatly reduce risk 4.40[3.83 to 4.97] Risk of Identity Theft: WTP to greatly reduce risk 6.51[5.86 to 7.16] Risk to Other Individuals and Businesses: WTP to greatly reduce risk relative 2.94[2.44 to 3.45]

Research Question 3: WTP for Hypothetical ISP Packages Hypothetical ISP Package 1 (Most Preferred): fee = $0, time = 0 hours, ISP can never limit Internet access, and all security risks are “greatly reduced.” Hypothetical ISP Package 2 (Quarantine): fee = $0, time = 1 hour, ISP can entirely cut off Internet access, and only security risks to others “greatly reduced.”

Research Question 3: WTP for Hypothetical ISP Packages Estimated WTP ($/month) 95% Confidence Interval Most Preferred Package7.24[6.51 to 7.97] Quarantine Package1.22[1.03 to 1.41]

Future Research Questions We have seen U.S. Home Internet Users are willing to pay for ISP security packages, but that they can also be ill informed wrt cyber security. If users were better aware of cyber security threats, would they pay more for security? We investigate this question in a forthcoming paper using 7 information treatments

Additional Information If you would like additional information please contact: Dallas Wood dwood at rti.org Brent Rowe browe at rti.org