Download presentation
Presentation is loading. Please wait.
Published byVirgil Goodwin Modified over 9 years ago
1
Social Science Experiment Jan-Willem Bullee
2
2 Cyber-crime Science Background Effectiveness of authority on compliance We can get some of the answers from »Literature (Meta-analysis) »Attacker stories/interviews But the answers are inconclusive »Different context »Hard to measure human nature »Difficult to standardize behaviour.
3
3 Cyber-crime Science Principles of Persuasion Authority »More likely to listen to an police officer Conformity »Peer pressure Commitment »Say yes to something small first Reciprocity »Return the favour Liking »People like you and me Scarcity »Wanting the ungettable
4
5 Cyber-crime Science Literature on Authority Classical Milgram Shock Experiment »66% full compliance [Mil63] S. Milgram. Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371–378.
5
5 Cyber-crime Science Introduction Key Experiment Get something from an employee Equal to password or PIN Intervention Impersonate
6
5 Cyber-crime Science Experimental Setup Design Intervention »Written memo »Key-chain »Poster R1R1 XO R2R2 O
7
5 Cyber-crime Science Hypotheses H 0 : Intervention and Control comply equally H 0 : Authority and Control comply equally H 0 : Effect of Authority on compliance
8
5 Cyber-crime Science Results 351 rooms targeted »N=118 (33,6%) populated Demographics Targets »Female: 24 (20%) Male: 94 (80%) »M age = 34, range (23-63) years Overall compliance distribution »52.5%/47.5%
9
5 Cyber-crime Science Results
10
5 Cyber-crime Science Results Intervention distribution »60%/40% H 0 : Intervention and Control comply equally »χ²-test »Hypothesis rejected
11
5 Cyber-crime Science Results Authority distribution »≈50/50 H 0 : Authority and Control comply equally »χ²-test »Hypothesis accepted
12
5 Cyber-crime Science Results Effect of authority »Logistic Regression »Employees that did not get the intervention are 2.84 times more likely to give their key away Intervention Give Key
13
5 Cyber-crime Science Results Effect of authority »Logistic Regression »Employees that did not get the intervention are 2.84 times more likely to give their key away »Authority: No effect Intervention Authority Give Key
14
5 Cyber-crime Science Results Comments: »“Great test!” “Cool Experiment” “Interesting study” »“I had doubts” “Having an keychain is important” »“Suspicious looking box” »“Guy in suit looked LESS trustworthy” »“Asked for my ID” »“Trusted me since I looked friendly” »“I feel stupid” »“I didn’t wanted to give the key, but did it anyway”
15
5 Cyber-crime Science Take Home Message Children, animals, people never react the way you want. Limited availability in July and August You are not important for others …unless you want to break the system 1/3 of employees works on a Wednesday in September 2.84 times higher odds to get key if no intervention
16
10 Cyber-crime Science Charging Mobile Phone
17
10 Cyber-crime Science Charging Mobile Phone What are the security considerations of the users of a public mobile phone charger? »What is the use rate of the device (per number of people at that location per hour), »Why do people use (or not) the system? »How do the safety perceptions of the current users differ between the former users and the non-users. You are the researchers!
18
10 Cyber-crime Science Crime Prevention CPTED Framework (Crime Prevention Through Environmental Design) Activity Support »Eyes on the street »Unfortunately: also provides opportunity »Overall crimes are reduced by increasing activity [Coz05] Cozens, P. M., Saville, G., & Hillier, D. (2005). Crime prevention through environmental design (CPTED): a review and modern bibliography. Property management, 23(5), 328-356.
19
10 Cyber-crime Science Hypotheses H 0 : Cabinets in busy and quite areas are equally used. H 0 : Cabinets with surveillance (e.g. service desk) and with no surveillance are equally used. H 0 : Cabinets in lunch hours (e.g. lunch) and lecture hours are equally used.
20
11 Cyber-crime Science Our Design Researchers: You (Student) Target: Fellow Students and Employee Goal: Observe »Observe and interview people Interface: Face 2 Face Count people and short questionnaire
21
12 Cyber-crime Science Method : Our design 2 experimental conditions »Users of the system / non users of the system 6 locations »Experimental: Bastille, Hal-B, Horst and Spiegel »Control: ITC (city center), Ravelijn
22
13 Cyber-crime Science Method : Our procedure Subjects from the experimental building »Teams of 1 researcher »One minute count: the people that pass-by »Approach users of the system Subjects from the control building »Teams of 2 researchers »Interview people walking in the area More details on the course-site
23
15 Cyber-crime Science What to do Before Tuesday 9 September »Register in the Doodle On 10, 17 (and 24) September »09:30 - 09:50 Briefing at ZI4047 »Travel to location »10:30 - 12:45 Experiment »12:45 - 13:30 Break and travel »13:30 - 15:45 Experiment part 2
24
16 Cyber-crime Science What to do We have permission to do this only at »UT: Bastille, Hal-B, Horst, Ravelijn, Spiegel and ITC Enter your data in SPSS »Directly after the attack »Come to me ZI4047 Earn 0.5 (out of 10) bonus points
25
17 Cyber-crime Science Ethical issues Informed consent not possible Zero risk for the subjects Approved by facility management Consistent with data protection (PII form) Approved by ethical committee, see http://www.utwente.nl/ewi/en/research/ethics_protocol/ http://www.utwente.nl/ewi/en/research/ethics_protocol/
26
18 Cyber-crime Science Conclusion Designing research involves: »Decide what data are needed »Decide how to collect the data »Use validated techniques where possible »Experimental Design, pilot, evaluate and improve »Training, data gathering
27
19 Cyber-crime Science Further Reading [Cia09] R. B. Cialdini. Influence: The Psychology of Persuasion. Harper Collins, 2009. http://www.harpercollins.com/browseinside/index.aspx?isbn13=9780061241895 http://www.harpercollins.com/browseinside/index.aspx?isbn13=9780061241895 [Gre96a] T. Greening. Ask and ye shall receive: a study in 'social engineering'. SIGSAC Rev., 14(2):8-14, Apr 1996. http://doi.acm.org/10.1145/228292.228295 http://doi.acm.org/10.1145/228292.228295 [Hof66] C. Hofling, E. Brotzman, S. Dalrymple, N. Graves, and C. Pierce. An experimental study in Nurse-Physician relationships. J. of Nervous & Mental Disease, 143(2):171-180, Aug 1966.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.