65
©2015 Carnegie Mellon University : 1 Social Cybersecurity Applying Social Psychology to Cybersecurity Jason Hong Laura Dabbish Sauvik Das Hyun-Jin Kim HCIC June 30, 2015 Computer Human Interaction: Mobility Privacy Security

Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

Embed Size (px)

Citation preview

Page 1: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

1

Social CybersecurityApplying Social Psychology to Cybersecurity

Jason HongLaura Dabbish

Sauvik DasHyun-Jin Kim

HCICJune 30, 2015

ComputerHumanInteraction:MobilityPrivacySecurity

Page 2: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

2

or, A Computer Scientist’s View of HCI and Theory

Jason HongLaura Dabbish

Sauvik DasHyun-Jin Kim

HCICJune 30, 2015

ComputerHumanInteraction:MobilityPrivacySecurity

Page 3: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

3

Introduction

• This is the most unusual talk I’ve ever given

• Got lots of funny looks from people

You’re going to talk about theory??

You’re going to talk about theory??

You’re going to talk about theory??

Ed Chi Leila Takayama James Landay

Page 4: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

4Who am I? What am I doing here?

Page 5: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

5

Most of My Work is Athereotical

• I do work in privacy, cybersecurity, ubicomp

• But little of it grounded in theory

Page 6: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

6

But It’s Not Just Me

Technical HCI work doesn’t seem to build a lot on top of each other’s work. There doesn’t seem to be a lot of theory either.*

*not an exact quote

Bob Kraut (Jedi Master, CMU)

Page 7: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

7

Examples of Tech HCI

Page 8: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

8

Why Little Theory Building in Tech HCI?

• Is it because it’s engineering?– I would say no– Civil Eng has traffic modeling, materials– MechE has heat transfer, mass transfer– EE has AC theory, circuit models, signal

Page 9: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

9

Why Little Theory Building in Tech HCI?

• Science of the artificial– Outside of speed of light, few limits

to computing– We make a lot of the rules, and mostly

limited by our imagination and market

• Compare to natural science– Only one way DNA works– Only one way brain circuit works– (And only one research team can win)

Page 10: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

10

Why Little Theory Building in Tech HCI?

• No clear natural objective function• Instead, goal of Tech HCI is to:

– Expand frontiers of what’s possible (expand our imagination)

– Sweep parameter space to understand principles and tradeoffs

• And while Tech HCI doesn’t build theory, it will occasionally use it

Page 11: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

11

Themes in This Talk

• Role of theory for Tech HCI?• Kinds of theories useful for Tech HCI?

– Some theories more useful than others

• Will describe our work on cybersec– Social Psych / Diffusion of Innovations

• My perspectives:– Tech HCI research– (Successful?) startup– Helped run Master’s of HCI program

Page 12: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

12

Cybersecurity Research Today

• Most research focused on computers– Protocols, detection, static analysis

• Some research on individuals– Mostly usability of tools

• But cybersec faces deep problems– How do people learn cybersecurity?– How can we fix misconceptions?– How to change people’s behaviors?

Page 13: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

13

A True Story

Did you hear what happened to Moe? He slipped on ice and damaged his laptop. Now he can’t get his data.

Page 14: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

14

A True Story

Did you hear what happened to Moe? He slipped on ice and damaged his laptop. Now he can’t get his data.

I’m going to back up my data right now!

Page 15: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

15

Light Bulb Moment

• Hung around behavioral scientists for many years– Learned about basics of social psych

thru osmosis

• Realized that this simple interaction led to desirable action

Page 16: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

16

How can we use social influences to help improve cybersecurity?

Page 17: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

17

Social Proof

Page 18: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

18

• Baseline effectiveness is 35%

Page 19: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

19

Page 20: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

20

• “showing each user pictures of friends who said they had already voted, generated 340,000 additional votes nationwide”

• “they also discovered that about 4 percent of those who claimed they had voted were not telling the truth”

Page 21: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

21

Energy Consumption

Page 22: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

22

Energy Consumption

Page 23: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

23

Social Cybersecurity

• Focus on usability has gotten us far, but security features rarely adopted

• Pop Quiz: How many of you have heard of / use these features?– Two-factor authentication– Login notifications on Facebook– Trusted contacts on Facebook

Page 24: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

24

Social Cybersecurity

• Adoption rate typically single digits [Das et al 2015]

• Why develop new tools if we can’t get people to adopt existing ones?

Page 25: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

25

Reflection 1Good Theory Can Offer Inspiration

• Cybersecurity research somewhat stuck in its approaches

• Diminishing returns after exploring, need new ideas and perspectives– See Lakhani08 paper on Innocentive

Page 26: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

26

Social CybersecurityOur Team’s Work to Date

• Interviews about why people changed behaviors and what they talk about with others [SOUPS 2014]

• Study w/ Facebook evaluating social interventions [CCS 2014]

• Analysis of who does and doesn’t adopt features [CSCW 2015]

Page 27: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

27

Semi-Structured Interviews

• Interviewed 19 people– Mobile authentication– App installation / uninstallation– Online privacy settings

• What caused the change?• Hear about incident thru a friend?• Talk to others about the change?

Das, S., H.J. Kim, L. Dabbish, and J.I. Hong. The Effect of Social Influence on Security Sensitivity. SOUPS 2014.

Page 28: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

28

Cybersec Behavior Changes

• 114 behavior changes coded• 48 had social influences (42%)

– Observing friends (14 of 48)– Social sensemaking (9 of 48)– Pranks and demonstrations (8)– Experiencing security breach (6)– Sharing access (3)

Page 29: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

29

Insight #1 - Observability

• One person stopped in coffee shop and asked about the Android 9-dot:

“We were just sitting in a coffee shop and I wanted to show somebody something and [they said], ‘My phone does not have that,’ and I was like, ‘I believe it probably does.’”

Page 30: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

30

Diffusion of Innovations

• Five major factorsfor successful innovations:– Relative Advantage– Trialability– Complexity– Compatibility– Observability

Page 31: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

31

Most Cybersecurity not very Observable

• How strong are Gary’s passwords?• What privacy settings does Leysia

have for Facebook?• What does Jofish look for to avoid

phishing attacks?

• Low observability -> hard to diffuse

Page 32: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

32

Reflection 2Good Theory Offers Vocabulary

• If we weren’t aware of Diffusion of Innovations, might have overlooked the comments about Observability

• Act of having a name focuses

Page 33: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

33

Insight #2 – Social Factors Might Work Against Adoption

• A lot of early adopters tend to be:– Security experts– People with clear reason (e.g. job)– Viewed as “Nutty” or paranoid [Gaw et al 06]

• Brand disenfranchisement– Illusory correlation between something

(use of security tools) and attributes of users

Page 34: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

34

Who Uses What Computer?

• “These people aren’t like me”– (Regardless of whether true or not)

Page 35: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

35

What are Professors Like?

Page 36: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

36

Social Proof + Make Cybersecurity Observable

• Variants– Control– Over # / %– Only # / %– Raw # / %– Some

Das, S., A. Kramer, L. Dabbish, J.I. Hong. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. CCS 2014.

Page 37: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

37

Method

• Controlled, randomized study with 50k active Facebook users– 8 conditions, so N=6250

• Part of annual security awareness campaign Facebook was going to run anyway

Page 38: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

38

Results of Experiment

Page 39: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

39

Social Influences on Adoption

• Analyzed 1.5M people on Facebook– No interventions, existing behaviors– More adopters a person can see,

more likely to adopt (but J-curve)– More social circles, stronger effects– More observable and social feature

(trusted contacts), stronger effects

Das, S., A.D.I. Kramer, L. Dabbish, J.I.Hong. The Role of Social Influence In Security Feature Adoption. CSCW 2015.

Page 40: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

40

Ongoing Work

• Are there other ways to make security more observable (+ safe)?– Note that this is counter to

conventional wisdom of security

• Other social techniques to influence people’s awareness, knowledge, motivation?

Page 41: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

41

Reflection 3Good Theory Should Offer Guidance

• We could have done mass A/B tests of interventions without theory– (This is essentially what industry does)– Instead, Social psych and Diffusion of

Innovations gave us direction

• Blind searches unsatisfying– Dan Russell’s talk at HCIC 2009– Eric Brill’s talk at HCIC 2013

Page 42: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

42

42

Dan Russell’s HCIC 2009 Slides

Page 43: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

43

43

Dan Russell’s HCIC 2009 Slides

Page 44: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

44

44

Dan Russell’s HCIC 2009 Slides

Page 45: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

45

What to Name Buttons?

Dan Russell’s HCIC 2009 Slides

Page 46: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

46

Why Unsatisfying?

• What’s generalizable?• What did we as a community learn?

Page 47: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

47

Reflection 4Good Theory Should Offer Insight

Page 48: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

48

Reflection 4Good Theory Should Offer Insight

“For instance, when Appel and Haken completed a proof of the 4-color map theorem using a massive automatic computation, it evoked much controversy. I interpret the controversy as having little to do with doubt people had as to the veracity of the theorem or the correctness of the proof. Rather, it reflected a continuing desire for human understanding of a proof, in addition to knowledge that the theorem is true.” - William Thurston, On Proof and Progress in Mathematics

Page 49: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

49

Reflection 4Good Theory Should Offer Insight

• Alternative formulation by Tim Gowers The Two Cultures of Mathematics– (i) The point of solving problems is to

understand mathematics better.– (ii) The point of understanding mathematics is to

become better able to solve problems.– Mathematicians lie on spectrum

Page 50: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

50

Pasteur’s QuadrantGood Science + Good Applications

Page 51: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

51

• Situated Action• Activity Theory• Distributed Cognition• Embodied Interaction• Ethnography

• Fitts’ Law• Learning science• Visual Perception• Social Psych• Motivation

Advice for Theory BuildersConsider Insight + Guidance

Guidance (What to Build / How to Build it Better)

Insi

ght

• Heuristic Evaluation• Contextual Inquiry• 41 Shades of Blue (A/B)• Iterative Design• Agile / Lean

Page 52: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

52

• Situated Action• Activity Theory• Distributed Cognition• Embodied Interaction• Ethnography

• Fitts’ Law• Learning science• Visual Perception• Social Psych• Motivation

Advice for Theory BuildersConsider Repackaging Too

Guidance (What to Build / How to Build it Better)

Insi

ght

• Heuristic Evaluation• Contextual Inquiry• 41 Shades of Blue• Iterative Design• Agile / Lean

Page 53: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

53

Wishlist for Tech HCI and for Master’s Students

• Design Theory– Service design– Engagement, stickiness

• Emotional Attachment• Innovation Theory

– What’s more likely to have impact?– Product lifecycles– Feature / Product / Business

Page 54: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

54

Example for InnovationChristensen’s Disruption Model

Page 55: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

55

Lifecycle of Product

Page 56: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

56• New product starts out with

lots of chaos• Eventually dominant design

appears, right combination of existing features / ideas

Page 57: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

57• Less innovation in features,

few changes to dominant design

• More innovation in process of production

• Dominant design only obvious in retrospect too

Page 58: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

58

• Extreme focus on cost, volume, capacity

• Very little innovation

Page 59: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

59• Cycle starts anew

• But winner of last cycle rarely winner of next

• Formed network, doesn’t want to anger them

Page 60: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

60

Conjecture: These Can Help Tech HCI Research

• Can focus research on the phase your company is in– More useful to help industry research

for connecting research to product– A/B tests only useful in later phases

• Can look forward to next fluid phase– We already do this– More useful for academic

Page 61: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

61

Other Advice For Theory Builders

• Five major factors:– Relative Advantage– Trialability– Complexity– Compatibility– Observability

• How might you applythese to your work?

Page 62: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

62

Summary

• Reflections: Good Theory…– Can Offer Inspiration– Offers Vocabulary– Should Offer Guidance– Should Offer Insight

• For theory builders: Consider…– Insight + Building Apps– Diffusion of Innovations

Page 63: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

63

Page 64: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

64

Reflection NBe Prepared to Invest a lot of Time

• This work only came about b/c of hanging around behavioral folks

• And because cross-trained students• Big open question: how to train PhD

students, given breadth of HCI?

Page 65: Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at HCIC 2015

©2

01

5 C

arn

egie

Mello

n U

niv

ers

ity :

65

Technical HCI Rarely Uses or Builds Theory

• Mostly uses low-level perception and interaction– Ex. Fitts’ law, psychoacoustics,

visual perception, reaction times– (Often built into toolkits)