behaviour change and cyber-security

42
Stream Two People: The Strongest Link # CYBERUK17 Behaviour Change, Cyber-Security and lessons from other domains Professor Adam Joinson, University of Bath

Upload: joinson

Post on 14-Apr-2017

43 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Behaviour Change and Cyber-Security

StreamTwoPeople:TheStrongestLink

#CYBERUK17

BehaviourChange,Cyber-SecurityandlessonsfromotherdomainsProfessorAdamJoinson,UniversityofBath

Page 2: Behaviour Change and Cyber-Security

Lesson1:Identifyabehaviourtochange

Page 3: Behaviour Change and Cyber-Security

• Fifteencampaignsanalysed

• Majorityawarenessraising• natureofcybersecurity

• raisingfearofconsequences

• Onepresentedevidenceofeffectiveness

• Onlyoneseemedtobebasedonbehaviourchangeprinciples

Page 4: Behaviour Change and Cyber-Security

PasswordmanagementUp-to-dateanti-virus/OSLogout/shutdownTrusted/secureconnectionsandsitesStayinformedMinimizepersonalidentityBeawareofphysicalsurroundingReporting

https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/309652/14-835-cyber-security-behavioural-insights.pdf

Page 5: Behaviour Change and Cyber-Security

The ‘who and what?’ of security behaviour

“…thestyles,approachesandvaluesthattheorganisationwishestoadopttowardssecurity.Itcanrangefromwhetheremployeesadheretoacleardeskpolicytowhethertheysharesensitiveinformationonsocialnetworkingsites.”http://www.cpni.gov.uk/Documents/Publications/2016/03.08.2016%20SeCuRE%20Tool.pdf

Page 6: Behaviour Change and Cyber-Security

8

COM-B system for analysing behaviour in context (Michie et al., 2011)

Michieetal.,2011

Page 7: Behaviour Change and Cyber-Security

Lesson2:Knowwhatsuccess(andfailure)lookslike

Page 8: Behaviour Change and Cyber-Security

Interventionmapping

Page 9: Behaviour Change and Cyber-Security

Define‘Cyber’

TakeTraining

MeasureCompliance

Page 10: Behaviour Change and Cyber-Security

Lesson3:Looktounderstandthecauses ofthebehaviour

Page 11: Behaviour Change and Cyber-Security

23

The Behaviour Change Wheel: hub

Michieetal.,2011

Page 12: Behaviour Change and Cyber-Security

24Michieetal.,2011

Page 13: Behaviour Change and Cyber-Security

Michieetal.,2011

Page 14: Behaviour Change and Cyber-Security

7

Common terms for methods for inducing behaviour change

EducateTrainHelp

Expose toInformDiscussSuggestEncourageIncentiviseAskOrderPleadCoerceForce

ProvidePromptConstrain

Michieetal.,2011

Page 15: Behaviour Change and Cyber-Security

9

Common terms for methods for inducing behaviour change

CapabilityEducateTrainHelp

MotivationExpose toInformDiscussSuggestEncourageIncentiviseAskOrderPleadCoerceForce

OpportunityProvidePromptConstrain

Michieetal.,2011

Page 16: Behaviour Change and Cyber-Security

self-monitoring in cycling

Piwek, L., Joinson, A., & Morvan, J. (2015). The use of self-monitoring solutions amongst cyclists: An online survey and empirical study. Transportation Research Part A: Policy and Practice, 77, 126-136.

isself-monitoringmainlyrelevantforperformance-orientedcyclists?

Page 17: Behaviour Change and Cyber-Security

13NON-TRACKERS

12TRACKERS

5 weeks

+INITIAL

SURVEY

DEBRIEFING INTERVIEW

pedometeronly

pedometer + calendar

+ cycling computer

Page 18: Behaviour Change and Cyber-Security

experiencesamplingcalendar

Page 19: Behaviour Change and Cyber-Security

total number of days cycled to campus in 5 weeks

total distancecycled across5 weeks (km)

non-trackerstrackers, high engagement with self-monitoring trackers, low engagement with self-monitoring

Page 20: Behaviour Change and Cyber-Security

self-monitoringismainlyrelevantforperformance-orientedcyclists>

Page 21: Behaviour Change and Cyber-Security

Spear Phishing Simulations

WorkingwithorganisationsintheCNI(gov,defenceindustry,finance)

Studyingtheirresultsfrominternalspearphishingexercises

>120,000spearphishemailssenttostaff

Codedbyresearchersoninfluencetechnique

Someindividualdataalsocollected

Inonecase,clickingledtosurvey

Page 22: Behaviour Change and Cyber-Security

Commonphishingtechniques• Exploitsocialnormsanddecision-makingprocesses

SocialInfluenceProcesses

SenseofUrgency

InvokingEmotions

DecisionBiases

• Useofdeadlines

• Timepressure• Canbenegative

orpositive

• Excitement,desire,hopeorcuriosity

• Fear,panicoranxiety

• Anger

• Authority• Liking&

similarity• Reciprocity• Conformity

• Truthbias• Confirmationbias• Expectations

• Mimictrustedentities

• Exploitauthenticitycues

LegitimacyCues

Page 23: Behaviour Change and Cyber-Security

Click rates vary hugelyAverage ~ 15% in largest data set (63,000)Authority, Urgency, Curiosity worked bestFew demographic differences, subsets of vulnerable users.

Page 24: Behaviour Change and Cyber-Security

Followupfocusgroups

Page 25: Behaviour Change and Cyber-Security

Example:Theroleoffamiliarityandexpectations

• “it’sacompanyshedealswith,we’vecurrentlygotproblemswithaccountspayable…andactuallywhywouldshenotbelievethatitwastrue.”

• “whenIfirstcamehere,Iwas,becauseIwasn’tfamiliarwithwhatthecompanieswerethatweregoingtoemailmenecessarilyIwasjustsortofclickingonanything…butitwasjustbecauseIwasn’tfamiliarwiththecompaniesthatweweredealingwith”.

• “Imeantherearesomeplaces,youdoget,yougetsomeemailsfromAmericaandtheywriteinadifferentwayanditdoesmakeitdifficultsometimestosortofspotthedifference”.

Williams, Hinds & Joinson (under review) ‘Employee susceptibility to

phishing’

Page 26: Behaviour Change and Cyber-Security

E-A-S-TframeworkJoinson,A.,&Piwek,L.(2016).Technologyandtheformationofsociallypositivebehaviours.BeyondBehaviourChange:KeyIssues,InterdisciplinaryApproachesandFutureDirections,157.

Page 27: Behaviour Change and Cyber-Security

Lesson4:Acceptcomplexityanddifficulty

Page 28: Behaviour Change and Cyber-Security
Page 29: Behaviour Change and Cyber-Security

Societal Influences Individual

Psychology

Individual Activity Activity

EnvironmentFood production industry

Consumption and practices

Biological Factors

Page 30: Behaviour Change and Cyber-Security
Page 31: Behaviour Change and Cyber-Security
Page 32: Behaviour Change and Cyber-Security
Page 33: Behaviour Change and Cyber-Security
Page 34: Behaviour Change and Cyber-Security
Page 35: Behaviour Change and Cyber-Security
Page 36: Behaviour Change and Cyber-Security

Typeoftrigger

Page 37: Behaviour Change and Cyber-Security

Lesson5:Workwith theflow,notagainstit

Page 38: Behaviour Change and Cyber-Security

Kairos– themoment• Theopportunemomenttoaimaninterventiontowardsusers.• B.J.Fogg:PersuasiveTechnology,p.41

Page 39: Behaviour Change and Cyber-Security

Make it easier to do the right thing

Page 40: Behaviour Change and Cyber-Security
Page 41: Behaviour Change and Cyber-Security

Lesson6:Evaluate,repeat

Page 42: Behaviour Change and Cyber-Security

Thanks

[email protected]@joinsonwww.joinson.com