{"id":815,"date":"2009-06-02T12:20:34","date_gmt":"2009-06-02T19:20:34","guid":{"rendered":"http:\/\/www.talesfromthe.net\/jon\/?p=815"},"modified":"2009-06-02T12:20:34","modified_gmt":"2009-06-02T19:20:34","slug":"the-pscyhology-of-security-and-privacy-a-cfp09-panel-discussion","status":"publish","type":"post","link":"https:\/\/2024.thenexus.today\/index.php\/2009\/06\/02\/the-pscyhology-of-security-and-privacy-a-cfp09-panel-discussion\/","title":{"rendered":"The psychology of security and privacy &#8212; a #cfp09 panel discussion"},"content":{"rendered":"<p>Raw notes &#8230;<\/p>\n<p><!--more--><\/p>\n<p>Bruce Schneier:I put the panel together because there&#8217;s a lot of work on the human side of security, pscyhology, risk.\u00c2\u00a0 There&#8217;s a lot to be learned from researchers in these subjects, economics, cultural anthropology &#8230; it&#8217;s a taste of the stuff out there.\u00c2\u00a0 How do we design systems and social policy in a way that they&#8217;re effective?\u00c2\u00a0 How do we respond to events and rhetoric?<\/p>\n<p>The feeling and reality of security are different.\u00c2\u00a0 You can feel secure if you&#8217;re not; you can be secure even if you don&#8217;t feel that way.\u00c2\u00a0 Two concepts, we use the same word.\u00c2\u00a0 We need to split them apart.\u00c2\u00a0 We don&#8217;t have the words to talk about a lot of these things.<\/p>\n<p>I view security as a tradeoff.\u00c2\u00a0 No such thing as absolute; you&#8217;re trading off time, convenience, etc.\u00c2\u00a0 The question isn&#8217;t &#8220;is it effective&#8221;, it&#8217;s abou the tradeoff.\u00c2\u00a0 e.g. bulletproof vests work great; none of us are wearing them.\u00c2\u00a0 People have different intuitions, and we talk based on our intuitions. Making security tradeoffs is part of being alive &#8230; we should be really good at it, since it&#8217;s key to evolutionary success.\u00c2\u00a0 Sometimes we&#8217;re really bad.\u00c2\u00a0 Why?<\/p>\n<p>A lot of it&#8217;s the distinction between risk and reality.\u00c2\u00a0 Work being done on evolutionary psychology &#8211; how we evolved based on situations 100,000 years ago.We&#8217;re highly optimized for decisions in small group living in the east african highlands 100,000 yeas ago.<\/p>\n<p>_________<\/p>\n<p>Christine Jolls of Yale Law School: focusing on privacy.\u00c2\u00a0 Almos everything we regard as private isn&#8217;t private vis-a-vis everyone.\u00c2\u00a0 Whether it&#8217;s personal informaiotn or your unclothed body, there are some people you don&#8217;t mind giving access to it.\u00c2\u00a0 When peple make decisions about who to give access, undersanding psychology and behavioral economics is key.\u00c2\u00a0 Brandeis: &#8220;privacy is the right to be let alone&#8221;. But nobody wants to be completely alone.\u00c2\u00a0 The work I do focuses on how the law should try to construct the relationship between ourseles and others.<\/p>\n<p>Think about workpalce email monitoring.\u00c2\u00a0 Employees are typically told that employers reserve the right to monitor email.\u00c2\u00a0 Employees may make bad decisions in this context.\u00c2\u00a0 People are aware their email may be monitored; many people don&#8217;t process this, and optimism bias explains a lot of this.\u00c2\u00a0 Example of optimism bias: economist professor Thaler asks students to predict where they&#8217;ll finish in the class, and 80% predict they&#8217;ll be in the top 20%.\u00c2\u00a0 Workplace drug testing&#8217;s anohter example; most people who are caught just smoked pot with a friend on the weekend, but figure &#8220;oh i probably won&#8217;t get tested&#8221;. Ditto for email accesss.<\/p>\n<p>Another facter: the way people think about the future vs. present.\u00c2\u00a0 &#8220;The priority of the present is like &#8216;me&#8217; vs. the rest of the world &#8212; everything else is later.&#8221;\u00c2\u00a0 People make decisions focusing on what they want right now, so the potential of future email monitoring\/testing is lower.\u00c2\u00a0 This is different from situations where people aren&#8217;t aware of the issues; people <em>do <\/em>know what they&#8217;re consenting to, and they still do.<\/p>\n<p>Congress han&#8217;t been responsive to these kinds of concerns.\u00c2\u00a0 Common &#8220;judge-made&#8221; law, however, often picks up on this.\u00c2\u00a0 For drug testing, if you sign a form just as you&#8217;re being tested, courts will trea thast as consent.\u00c2\u00a0 If you sign it a year in advance (where these kinds of effects kick in), courts won&#8217;t treat it as valuable.\u00c2\u00a0 The same pattern applies elsewhere.\u00c2\u00a0 Why is statuatory law so less aware of these issues?<\/p>\n<p>___________<\/p>\n<p>Rachna Dhamija, CEO, Usable Security Systems and Fellow at the Harvard Center for Research on Computation and Society. Think about educating uses.\u00c2\u00a0 Tips are pages and pages long &#8212; even just on &#8220;how to choose a password&#8221;.\u00c2\u00a0 We&#8217;re starting to see security games.\u00c2\u00a0 Or fun posters: &#8220;passwords are like pants, you shouldn&#8217;t sure them&#8221;.\u00c2\u00a0 MSR did a major study: uses have 25 accoutns and 6 passwords they reuse.\u00c2\u00a0 3M Yahoo! pasword resets\/month.\u00c2\u00a0 Google password study: 15M accounts, 50% choose from only 1M possibilities.<\/p>\n<p>Why don&#8217;t uses do better?\u00c2\u00a0 &#8220;I can&#8217;t&#8221; &#8212; cogintive limitations.\u00c2\u00a0 &#8220;I have nothing to lose!&#8221;\u00c2\u00a0 That infuriates me as asecurity researcher, but on second thought maybe users are right: Consumers Union&#8217;s recent survey shows that most people don&#8217;t have issues.<\/p>\n<p>Users in their daily lives just wan tto get tasks done, they&#8217;re not focused on security.\u00c2\u00a0 Attackers exploit this by adding urgency.\u00c2\u00a0 Security interrupts like &#8220;invalid certificate&#8221;, users see &#8220;something happened and you need to hit okay to get on with doing things.&#8221;\u00c2\u00a0 Geting informed consent is hard; users will knowingly install spyware if they think functionality is vlauable.\u00c2\u00a0 Users are over-confident in their abiilty to protect themselves: &#8220;I can always uninstall it.&#8221;<\/p>\n<p>Users don&#8217;t notice the absence of security indicators.\u00c2\u00a0 RSA&#8217;s response: &#8220;You found a weakness, but Gartner&#8217;s survey showed most users find our security conenient.&#8221;\u00c2\u00a0 Bruce&#8217;s point abou difference<\/p>\n<p>Design assumptions: users<\/p>\n<ul>\n<li>don&#8217;t have perfect memories<\/li>\n<li>can&#8217;t keep secrets<\/li>\n<li>won&#8217;t carry exra devices<\/li>\n<li>aren&#8217;t motivated by security<\/li>\n<\/ul>\n<p>websites:<\/p>\n<ul>\n<li>are people too<\/li>\n<li>benefits must exceed costs of deployment<\/li>\n<li>are not motivated by security<\/li>\n<\/ul>\n<p>Currently working on UsableLogin: consistent across sites, only one &#8220;codeword&#8221; to remember, no single point of failure.\u00c2\u00a0 Can take it to various sites, converts my codeword the site&#8217;s login info.<\/p>\n<p>_______<\/p>\n<p>Alessandro Acquisti<\/p>\n<p>A rational model of privacy descision making.\u00c2\u00a0 Johnny MySpace debates about whether to publicize his kinks on MySpace, weighs benefits (i might find a lover) and risks (my employer might find it) and decides.\u00c2\u00a0 It doesn&#8217;t work that way.\u00c2\u00a0 2004 paper: incomplete informaiton, bounded rationality, psychological and behavioral biases (hyperbolic discounting, optimism bias).\u00c2\u00a0 Now focus on experiments in privacy decision-making. Subtle variations of framing can lead to dramatic changes in valuation of personal information or willingness to reveal iformation.<\/p>\n<p>1. the herding effect.\u00c2\u00a0 People were asked questions about ethical q&#8217;s and wheher htey engaged in them.\u00c2\u00a0 We&#8217;d then show information about ostensible rates of how others had answerd: low admission rates, high admission rates, high &#8220;decline to answer&#8221; rates.\u00c2\u00a0 e.g. have you made a false or inflated insurance claim.\u00c2\u00a0 We found that after seeing high admission rates for other questions, people would be more likely to admit &#8212; even on questions about other kinds of behavior.\u00c2\u00a0 &#8220;the herding effect&#8221;: if i see others admit, I&#8217;m likely to.<\/p>\n<p>2. the frog effect: do privacy intrusions alert u to privacy concerns, or densitize us?\u00c2\u00a0 We simulated privacy intrusions thorugh a survey with 30 diff questions at different level of sensitivity and intrusivienss. \u00c2\u00a0 e.g. &#8220;have you ever left the lights on because you were lazy&#8221; vs &#8220;have you watched pornography w\/o being sure of the age of the people involved.&#8221;\u00c2\u00a0 We manipulated the order: tampe to intrusive, intrusive to tame, pseudo-random, sudden.\u00c2\u00a0 Alo when identifying info was asked: at the start vs. at the end.\u00c2\u00a0\u00c2\u00a0 &#8220;Frog hypothesis&#8221;: people will admit to sensitive behavior more often as they get warmed up (i.e. qustions go from tame to untrusive).\u00c2\u00a0 &#8220;Cohereent arbitrariness&#8221;: peole will admit <em>less <\/em>often as they get warmed (questions go fform more to less senseitive).\u00c2\u00a0 Results: frog hypothesis rejected.\u00c2\u00a0 &#8220;Have you had a fantasy of torturing somebody?&#8221; W\/ decreasing order, 60% say use; with increasing order, 40%.<\/p>\n<p>3. willingness ot pay for protection of personal data vs. willingness ot accept $ to reveal personal data.\u00c2\u00a0 $10\u00c2\u00a0 anonymous gift card: your name won&#8217;t be linked, usage won&#8217;t be tracked.\u00c2\u00a0 $12 trackable card.\u00c2\u00a0 We then give subjects an option of a second card, and asked if they want to switch.\u00c2\u00a0 Do I want to get $2 more to give away my data? vs. Do I want to give away $2 to protect&#8221;.\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 50% of subjects will switch from $10 to $12 card; value of privacy = $1.\u00c2\u00a0 only 10% will switch from $12 to $10, value of privacy = $0.20.<\/p>\n<p>____<\/p>\n<p>Schneier recommends The Science of Fear.<\/p>\n<p>____<\/p>\n<p>Mike Nelson: people are looking at pscyhology of children online.\u00c2\u00a0 Are you looking at how kids develop senses of this?<\/p>\n<p>Schneier: danah boyd has looked at this.\u00c2\u00a0 THere&#8217;s a huge generational diff between comfort about saying things online.\u00c2\u00a0 Parents need cybersecurity training a lot more than kinds.<\/p>\n<p>Christine: children discount the future more, and suffer from more optimism bias.<\/p>\n<p>Rachel in the audience: there was an Annenberg study when COPPA came out on marketers focusing on 14-17 year olds to get family informaiton.\u00c2\u00a0 A sudy from NC State was that the online behavioral differences from children mirror behavioral differences offline.<\/p>\n<p>Rachna: plenty of evidence that minors are good at subverting filters.<\/p>\n<p>Q for Christine: are you suggesting that the law needs to accomodate that people don&#8217;t make rational decisions?\u00c2\u00a0 Does this extend beyond the privacy sphere?<\/p>\n<p>Christine: Richard Posner claims that judge-made law tends to be economically efficient.\u00c2\u00a0 Why?\u00c2\u00a0 Occam&#8217;s razor: judges are human beings and understand hese distortions.\u00c2\u00a0 Here are ohter areas where judges don&#8217;t map so closely to behavioral economics.\u00c2\u00a0 What is it about privacy that leads judges to get it right?\u00c2\u00a0 Maybe i&#8217;s just that it&#8217;s had and hey think about a lot.<\/p>\n<p>Alessandro: perhasp one reason statutory law doesn&#8217;t reflect this is that legislators are concerned about being paternalistics.<\/p>\n<p>Christine: certainly possible, although it might also be lobbying etc.<\/p>\n<p>Bruce: decisions under fear are highly optimized.\u00c2\u00a0 you can so somebody a picture of a snake, and their reactions kick in before they realize its a snake.<\/p>\n<p>David Campbell: how should security professionals react?<\/p>\n<p>Rachna: need to avoid training &#8212; it&#8217;s usually fine to hit &#8220;ok&#8221;<\/p>\n<p>Alessandro: giving people total control often doesn&#8217;t help.\u00c2\u00a0 so there&#8217;s a room for regulation<\/p>\n<p>Bruce: another good book: The paradox of choice<\/p>\n<p>Audience: Dan Gilbert&#8217;s TED Talk &#8220;what makes us happy&#8221; is a great<\/p>\n<p>Q: we&#8217;re socialized for certain kinds of risks &#8212; don&#8217;t give out your phone # to trangers in bars.\u00c2\u00a0 we&#8217;re not socialized to other risks, like FB.\u00c2\u00a0 Is this self-correcting over time<\/p>\n<p>Bruce: yes<\/p>\n<p>Rachna: yes if harm&#8217;s traceable back to the mistakes that leads to harm.\u00c2\u00a0 most people who have their identity stolen have no idea how\/why.<\/p>\n<p>Christine: big distinction betwen knowing the average risk and pesonal risks.\u00c2\u00a0 i think people will correct for average risk, but due to optimism bias not so sure about personal risk<\/p>\n<p>Audience: there are a lot of people who avoid activities because of fear.\u00c2\u00a0 have you studied the effectiveness of techniques?<\/p>\n<p>Rachna: seals like truste are effective at helping people with fear, although also easily spoofed by attackers<\/p>\n<p>Audience: trying to reconcile &#8220;people don&#8217;t pay enough attention to privacy&#8221;, but first presentation said that the cost is low.\u00c2\u00a0 aren&#8217;t people being rational?\u00c2\u00a0 what&#8217;s the problem?<\/p>\n<p>Schneier: people are making the right choice, it&#8217;s just a bad design.<\/p>\n<p>Christine: its different depending on the context.\u00c2\u00a0 in the workplace, people make bad decisions all the time.\u00c2\u00a0 in another context, people would sign away the privacy of their house &#8212; &#8220;you can come in and repossess furniture even if i&#8217;m not home&#8221;.\u00c2\u00a0 udges hae struck this down.<\/p>\n<p>Alessandro: we&#8217;re not saying right or wrong, we&#8217;re showing that small changes in wording can lead to huge differences in behavior.\u00c2\u00a0 so privacy preferences are malleable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Raw notes &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-815","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/comments?post=815"}],"version-history":[{"count":0,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/posts\/815\/revisions"}],"wp:attachment":[{"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/media?parent=815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/categories?post=815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2024.thenexus.today\/index.php\/wp-json\/wp\/v2\/tags?post=815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}