A Risk Perception of Study of Attitudes Toward Homeland Security Systems

Similar documents
The structure and organization of the Fusion Center takes its direction from four key documents, they are:

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

A Performance Review for Competitive Intelligence

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

Passenger Protect Program Transport Canada

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Cyber Adversary Characterization. Know thy enemy!

How To Make A Terrorist Watchlist More Secure

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

National Security Agency

JULY 25, Good morning, Chairwoman Kelly, Chairman Simmons and members of the

Data-Based Detection of Potential Terrorist Attacks on Airplanes

El Camino College Homeland Security Spring 2016 Courses

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need

IPSC Institute for the Protection and Security of the Citizen. Stephan Lechner IPSC Director

The Strategic Importance, Causes and Consequences of Terrorism

Screening of Passengers by Observation Techniques (SPOT) Program

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Framework Notes. How has it come to be used or considered by DHS? Where is it used or being considered for use?

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

May 2 1,2009. Re: DHS Data Privacy and Integrity Advisory Committee White Paper on DHS Information Sharing and Access Agreements

DATA MINING - 1DL360

GAO AVIATION SECURITY. Measures for Testing the Impact of Using Commercial Data for the Secure Flight Program. Report to Congressional Committees

Basic Airport Security Awareness

Homeland Security Plan for Iowa State University Extension Field Offices

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

How To Write A Book On Risk Management

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Civil Liberties and Security: 10 Years After 9/11

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, My name is Richard Allan, and I am the Director of Public Policy

TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005

Urban Transport Security presented by Patrick Dillenseger RATP

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

TSA Operations Center Incident Management System

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

EASTERN KENTUCKY UNIVERSITY

Situated Usability Testing for Security Systems

Training Courses Catalog 2015

Inventec Corporation Corporate Social Responsibility Best Practice Principles

Traceable Physical Security Systems for a Safe and Secure Society

GOOD SECURITY IS A GROUP EFFORT

Policy Instruments & (Side)-Effects

MetaTech Consulting, Inc. White Paper. A Treatment of Data Mining Technologies

Out of the Frying Pan into the Fire: Behavioral Reactions to Terrorist Attacks

Risk Assessment Guide

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Patriot Act Impact on Canadian Organizations Using Cloud Services

Kuala Lumpur, Malaysia, May Report

Moscow subway cars to have CCTV

When Security, Privacy and Forensics Meet in the Cloud

Creating Smarter, Secure Airports: The Shift to Integrated Security

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border

Table of Contents 1. INTRODUCTION 2 2. DEFINITION 4 3. UAS CLASSIFICATION 6 4. REGULATORY PRINCIPLES INTERACTION WITH AIR TRAFFIC CONTROL 16

Smart Cities. by MTR Digital. The future of advanced urban management. MTR Digital

Spreading the Word on Nuclear Cyber Security

The Intrusive Nature of Discovery in U.S. Patent Litigation

Privacy vs. security a given trade-off?

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

Northrop Grumman Cybersecurity Research Consortium

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

The Geography of International terrorism

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

SEATTLE. Contact Us! Visit Us! NATIONAL ARCHIVES at

Information Visualization WS 2013/14 11 Visual Analytics

Aerodrome Advisory Circular

Security for Railways and Metros

INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) INCLUSION OF INFORMATION SHARING PERFORMANCE EVALUATION ELEMENT IN EMPLOYEE PERFORMANCE APPRAISALS

NIMS ICS 100.HCb. Instructions

Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett

Public Opinion on Selected National Security Issues:

Cornell University PREVENTION AND MITIGATION PLAN

The FBI and the Internet

International Journal of Enterprise Computing and Business Systems

PRIVACY & CRIMINAL JUSTICE INFORMATION: A PRIMER

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment

Transcription:

A Risk Perception of Study of Attitudes Toward Homeland Security Systems Frederic A. Morris Thomas F. Sanquist Heidi A. Mahy Pacific Northwest National Laboratory Operated by Battelle for the US Department of Energy Seattle, WA 1

Terrorism event creates demand for increased security Event: Terrorist Attack Characteristics: Uncontrollable Shock Fear Signal: Media Portrayal Public Response Interpretation and Response: Develop new security systems Type of Impact: Demand for info Public concern Trust Government Individual Spread of Impact 2

3 Examples of Security Systems

Homeland security systems and information privacy - Issues People are subjects of security systems. Increasing concern over information privacy Several proposed government systems have stumbled on issue of privacy Terrorism Information Awareness (TIA) Computer Aided Passenger Profiling (II) Secure Flight Potential Client Needs: Data mining methods that preserve information privacy Methods for understanding and predicting public acceptance Need to consider likelihood of terrorism events in relationship to security system utility and implementation costs 4

What do we really know about attitudes toward privacy and security? Very few empirical studies Privacy concerns decrease immediately following a terror event, and increase with passage of time Survey studies show there are privacy concerns but are not granular enough to understand the specifics Security technologies can be considered risky in terms of privacy and thus amenable to empirical analysis by risk perception methods 5

Social science and technology study of information privacy Legal review EO 12333, Privacy Act, Foreign Intelligence Surveilllance Act, etc. Policy analysis Privacy policies, Privacy offices and impact assessments, domain-specific privacy policies Technology analysis Privacy preserving data mining techniques, data perturbation, pseudonymization Survey of attitudes Homeland security technologies X rating dimensions 6

Survey methods Adopted risk perception framework: what are the privacy risks and perceived benefits of homeland security technologies? Psychometric survey: 182 subjects, 12 security systems X 14 rating attributes, 7 point Likert scale Subjects recruited from PNNL (78) and University of Washington (104 undergrads) Rating scales developed from content analysis of privacy risk reports and security performance attributes Data reduced by factor analysis and evaluated with analysis of variance 7

Psychometric Survey Elements Systems Airport Screening Canine detectors Surveillance cameras Data mining Radio frequency passport Email & internet monitoring GPS location tracking Travel tracking Trusted traveler National ID card Citizen observers Rating attributes Transparency Control Personal benefit National security Accuracy Equitable Validity Risk of disclosure Risk of false ID as threat Risk of financial loss Risk of embarrassment Intrusiveness Civil liberties infringement Acceptable 8

Survey item format Please rate the following security approaches according to whether you perceive an improvement in national security that results from their application. Definition of National Security The extent to which there is reduced risk of terrorists carrying out attacks within the United States. Airport passenger and baggage screening 9

Rating results Civil Liberty Infringe Acceptable 10

11 Factor Loadings

Some interesting patterns In general student and professional respondents showed very similar patterns Students tend to rate some security systems as more useful than professionals (e.g., airport, surveillance & citizen observer) The least acceptable security processes are widely applied (e.g., data mining and email screening) Distinction between systems where subjects have knowledge of being screened, versus invisible application Systems rated as highly acceptable and effective (e.g., airport security, radiation screening) do not perform objectively as public perceives 12

What does psychology add to public acceptance of security technology? Concepts for understanding public perception: risk perception framework Methods for quickly measuring and predicting public acceptance Quantitative approaches to isolating important elements contributing to public acceptance Potential for addressing public concerns Assess early Anticipate likely reactions to planned security systems 13

Next steps Evaluate trust issue: does it matter who is administering security technology (or is it more important WHEN?) Assist in addressing public concern by understanding likely reactions to anticipated security systems Advanced imaging technologies Explosive detection Surveillance imagery Risk Analysis, 2008, 28(4): 1125-1133 14

Lessons for raising looming threats to the fore...(such as climate change) Signal events e.g., weather extremes, flooding, crop failures, migrations, droughts, glacial melts. Currently not portrayed by governments or media as existential threat (no dread risk.) Core problem of consumption addressed only indirectly by cap/trade policies Energy consumption has benefits (comfort and convenience) and risks (climate change) Attitudes and information about climate change risks do not translate to substantial and enduring behavior change 15

Climate Change Seen as Threat to U.S. Security 16 August 9, 2009

Thank You Tom Sanquist Pacific Northwest National Laboratory Battelle Seattle Research Center 1100 Dexter Ave, Suite 400 Seattle, WA 9109 206-528-3240 sanquist@pnl.gov 17