Download presentation
Presentation is loading. Please wait.
Published byDrusilla Golden Modified over 8 years ago
1
Cyber-crime Science Pieter Hartel & Marianne Junger
2
The Course Goals »Study cybercrime from a social perspective Organisation »Teams of three (for 5 EC) »Do an experiment »Write a paper »Review other papers »Present the paper at a conference http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science 2
3
Team Lecturers »Prof dr Pieter Hartel (computer science) »Prof dr Marianne Junger (social science) Teaching assistants »Dr Lorena Montoya (TU Delft) »Jan Willem Bullée (U Twente) 3 Cyber-crime Science
4
Contents Theory »What is Crime and Cyber-crime? »Technology (ICT) creates opportunity »Crime Science is evidence based »Opportunity reduction works Practice »How to do an opportunity reducing experiment in this course? »Report on the evidence. Cyber-crime Science 4
5
Crime and Cyber-crime Crime »Behaviour commonly considered harmful, serious Disorder »Lack of order, broader than crime Cyber-crime »ICT used as a tool, target or place 5 [New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25http://dx.doi.org/10.1007/978-1-4419-0245-0_25 Cyber-crime Science
6
Porn on video billboard Cyber-crime Science 6
7
Cyber-crime is big business Estimate (B$)Year Anti-virus3.42012 Patching12010 ISP clean-up0.042010 User clean-up102012 Defence firms102010 Law enforcement0.42010 7 [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf Cyber-crime Science
8
ICT creates opportunity Offenders know that they run little risk Targets often don’t understand the risks Cyber disinhibits Cyber-crime Science 8
9
Crime Science Five principles of opportunity reduction 1.Increase effort 2.Increase risks 3.Reduce rewards 4.Reduce provocation 5.Remove excuses Measure the effect of the intervention Cyber-crime Science 9
10
Opportunity reduction works 10 [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536 http://dx.doi.org/10.1145/1572532.1572536 Clicked on link (%) Cyber-crime Science
11
Practice Cyber-crime Science 11
12
12 Question Is an intervention as coursework feasible? »Yes, but it’s hard work »… and it can be a lot of fun Check out what 43 teams have done in previous years [Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/ http://eprints.eemcs.utwente.nl/22066/ Cyber-crime Science
13
13 Interactive trash cans, N=24 Cyber-crime Science
14
14 Course Schedule team+ topic Draft research proposal Final proposal & slide Experiment & draft paper final paper review & slides (5 weeks) (6 weeks) (9 weeks) PII form Reviewing Research Methods Presentations Ethical committee APA paper writing Present ideas Present again Cyber-crime Science
15
Help is at hand What? »Clinics: get feedback or discuss »F2F or via Skype When? »Sign up via the doodle to get a timeslot »16/17 and 22/24 February, and 14/16 March More details on website Cyber-crime Science 15
16
16 Examination By coursework only »Quality of the paper »Quality of the reviews »Quality of the presentations You will be marked by your peers »And you may not like it… »But the lecturers and TAs are the moderators Cyber-crime Science
17
17 FAQ Team topic (week 1) »What is the crime/disorder and how will you prevent it? Draft proposal (week 3) »What are the risks for the researchers and the subjects? »What is the control group? Final draft proposal (week 5) »Does my design work? Do a pilot! Draft paper (week 14) »Can someone else repeat the experiment? Final paper (week 18) »Are the results statistically significant? Cyber-crime Science
18
18 What to do next? 1.Sign up by mailing Pieter Hartel 2.Complete and sign the PII form now 3.Social science training : 0.5 bonus point 4.Write 1 A4 Research proposal with: »Background »Method »Three key references »Appendix: Checklist Ethical Committee 5.For the forms and deadlines see: http://www.ewi.utwente.nl/~pieter/CCS/ http://www.ewi.utwente.nl/~pieter/CCS/ Cyber-crime Science
19
Project ideas Discussion Cyber-crime Science 19
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.