FEMALE PRIVACY AND CLOUD SECURITY 1



Similar documents
A Parents Guide to ConnectSafely.org

15 Dangerous Apps Every Parent Should Know About

A Parents' Guide to ConnectSafely.org

A Parents Guide to ConnectSafely.org saferinternet.org.uk

SEXUAL PREDATORS ON MYSPACE:

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Youth Online Behavior

Affirmative Action Presentation

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Staying Safe Online. A Practical Guide for Parents and Children.

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Stalking 101: Understanding the lethality of stalking in today s world

Lessons for Teens: Risky Internet and Social Networking

HOW TO STAY SAFE. Smartphones

Unit title: Cyber Security Fundamentals (SCQF level 4)

Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

Privacy and the Internet AUSTRALIAN ATTITUDES TOWARDS PRIVACY IN THE ONLINE ENVIRONMENT

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying. Welcome!

IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Internet Safety Guide for Parents

National Cyber Security Month 2015: Daily Security Awareness Tips

2011 NCSA / McAfee Internet Home Users Survey

2012 NCSA / McAfee Online Safety Survey

Guideline on Windows 7 Parental Controls

National Cybersecurity Awareness Campaign. Kids Presentation

Backing Up Your Files. External Hard Drives

UNIVERSITY OF ST ANDREWS. POLICY November 2005

Outsmarting On-line Predators. Christina Kilbourne

STOP. THINK. CONNECT. Online Safety Quiz

Today s mobile ecosystem means shared responsibility

Online Safety for Middle and High School

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Norton Online Reputation Report:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Cyber Safety For Parents

Basic Computer Security Part 3

Google: Trust, Choice, and Privacy

2014 Teen Internet Safety Survey. Conducted by The Futures Company

ABSTRACT OF THE DOCTORAL THESIS BY Cătălin Ovidiu Obuf Buhăianu

When should this tool be used?

Teen Online & Wireless Safety Survey

Address Co-Principal Investigator Information Co- Principal Investigator Faculty Staff Grad. Student Undergrad. Student

Planning of the Pilot Program

Computing and Communication Policy on Acceptable Use of Electronic Resources

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Sharing Personal Images and Videos Among Young People

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Guidance on IRB Continuing Review of Research

Cyber safety Parent Easy Guide 63

Internet Safety Fact Sheet Facts about Social Networking:

E-Safety Issues and Online Safety

Chapter 3. Online Bullying

Background. Executive Summary

Sida. Andrew Lewman 26 May 2014

e-safety for Parents

Anonymity, Privacy, and Security Online

Today s teens use technology more than ever. Most have

Mobile Security & BYOD Policy

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

September A Anti Bullying (Cyber Bullying) version 9

An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes

The. biddible. Guide to AdWords at Christmas

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety. Parents Evening

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Teacher Guide TEEN SAFETY

OAuth Web Authorization Protocol Barry Leiba

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

IRB 101: HUMAN SUBJECTS PROTECTION PROGRAM

How To Prevent Cybercrime

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

UAB Psychology Department Participant Pool Guide for Researchers 1 GUIDE FOR RESEARCHERS CONDUCTING RESEARCH WITH INTRODUCTORY PSYCHOLOGY STUDENTS

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Hendrix College Psychology Department Sona Systems Guide for Researchers

Computer Facilities and External Networks Acceptable Use by Students

1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268

Common Facebook issues

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

BE SAFE ONLINE: Lesson Plan

Digital Citizenship Lesson Plan

E-Safety Policy (Parent/Pupil) March 2013

An Instructional Module for Protecting Privacy on Social Networking Sites

SONA SYSTEMS RESEARCHER DOCUMENTATION

2012 NCSA / Symantec. National Small Business Study

Cybersecurity Protecting Yourself, Your Business, Your Clients

Institutional Review Board for the Use of Human Subjects in Research GUIDELINES FOR A PROPOSAL NARRATIVE

NORTON CYBERSECURITY INSIGHTS REPORT

Abilene Independent School District. Bring Your Own Device Handbook

Psychology. The Effects of Facebook on Jealousy in Relationships Jennifer L. Eby. This paper was written for Dr. Kraemer s Survey Research course.

Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, pages. Advisor: Robert Capra

Backing up your digital image collection provides it with essential protection.

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.

Transcription:

FEMALE PRIVACY AND CLOUD SECURITY 1 Female Privacy and Cloud Security via Smartphones Jasmijn Kol, Dominik Terweh, Judith Weda Cyber-Crime Science 201100221 Prof Dr Pieter Hartel, Prof Dr Marianne Junger 09.12.2014, University of Twente

FEMALE PRIVACY AND CLOUD SECURITY 2 Abstract This research tries to determine whether or not an educational game could be a satisfying prevention method against the leakage of personal data from clouds. Due to recent leakage of celebrity nude photos, women are getting aware that they have insufficient knowledge about protecting their own privacy on phones and clouds. Through questionnaires and a serious game or task list, participants are examined on their cloud and phone skills. Participants using a list to complete tasks take a significant amount of more time to complete tasks compared to participants who use the game. Introduction Due to a recent leakage of celebrity nude photos, women are getting aware that they have insufficient knowledge about protecting their privacy on the Internet. This is a big problem, since many (young) women have private pictures on their phones. They often do not know that these pictures get stored, automatically, in huge databanks or clouds. Leakage of these images to the wrong people could have huge consequences for their future career and private life. Therefor, it is key to educate women on the dangers of cloud storage, prevention and security as best as possible, for their own protection. Literature study Harassment, cyber stalking and cyber-pornography are the most used crimes against women worldwide. (Agarwal, 2013) The second being the most relevant to this paper, since posting someone s private pictures online is a type of cyber-stalking. It is also stated by Agarwal, that Cyber stalking usually occurs with women, who are stalked by men, or children who are stalked by adult predators. [ ] It is believed that over 75% of the cyber-stalking victims are female. The motives behind cyber stalking have been divided into four reasons, namely, for sexual harassment, for obsession for love, for revenge and for ego and power trips. (2013, p.

FEMALE PRIVACY AND CLOUD SECURITY 3 2). It is supported by Halder and Jaishankar, that these crimes mostly seem to be in a sexual nature. They state that: In most cases male harassers attack the victim for sexual purposes like morphing, using the image for pornographic purposes, cyber stalking etc. [...] (2009, p. 12). In this new age females are at a higher risk of these crimes, especially when they act carelessly when sharing or storing sensitive information. Individuals may increase their chances of coming in contact with potential harassers by regularly using computer-mediated communications such as chat rooms or social networking sites to connect with others (Finn, 2004). These are all very basic services, used by practically everybody. Any individual that does not know how to protect him or herself could be a potential victim of cybercrimes. The Internet and easy sharing shows to be a threat to women around the globe especially those that are unaware of the dangers and consequences of sharing indiscriminately. The obvious danger associated with sexting is that the material can be easily and widely disseminated. Once the message or image is in cyberspace, the sender loses control over the material and cannot assume that it will remain private. (Katzman, 2010) It is easy to forget that once something has been placed on the Internet, on a cloud or otherwise, it is unlikely for it to ever be fully deleted. Therefore women have to be educated about the risks they take when they take pictures and store them. The goal of the research is to find ways to improve cloud- and phone safety awareness, in women. Finn claims that: Individuals must become savvy both online and offline; know how to take precautionary measures in cyberspace and how to seek recourse if their rights are violated. (Finn, Banach, 2000) Dashora introduces a list of things one can do to protect oneself from cyber crime. (2011) They are useful tips, but they might not reach people, as they are stated in a scholarly paper. Misra mostly talks about several remedies to help prevent cyber crime. The most important thing for this research is the introduction of raising awareness about cyber culture and it s drawbacks. (2011) The intention is to educate through a game, designed to help women secure their phone and data.

FEMALE PRIVACY AND CLOUD SECURITY 4 It has been shown that serious games are powerful learning tools, not limited to training but useful for a vast diversity of educational purposes. (Mouaheb, Fahli, Moussetad, Eljamili, 2012) Computer and videogames can be regarded as providing authentic, meaningful and powerful contexts for learning. [ ] Further, when contrasted with traditional views of education, games provide a learner-centred rather than teacher-centred approach to education. (Stapleton, 2004, p.5) The game should make the users more aware of the dangers of the Internet and make them better at securing their phone in comparison to their peers. This is a prevention method. It will not solve the problem of hackers trying to get personal data from women (or male users). However, helping women to secure their phones will, hopefully, prevent another leakage of personal photos from happening again. Method The study that will be performed is whether or not an educational game is a good way to teach women about how their phone security works and how to prevent big security leakages. There will be a test group and a control group. Both groups will fill out the same questionnaire. After the first questionnaire, the control group will do six tasks without the help of any medium. The test group will get an educational game, which will guide them through the same tasks. The game provides both an explanation and enjoyment while completing the tasks. What will be tested, is if participants have a better ability to find the things they need to do to protect their phone and why, with an educational game. In Appendix B, a description of this educational game, the intervention, will be provided. At the end of their session, the test subjects will fill out another questionnaire, to see if their skills and knowledge about phone and cloud security has improved. During the second part of the research (the completion of the tasks), both groups will be observed by one of the researchers. The observer will be present to assess the subject and their skill and skill

FEMALE PRIVACY AND CLOUD SECURITY 5 improvement, as well as their reactions to the game, if the subject is part of the test group. Which group a subject is part of will be randomly decided before their session begins. Both groups will consist of women only, as they are the main target group. The subject group will be a small, random sample of women between the ages of 18 and 30. This is the group that is most vulnerable to online cyber stalking attacks of a sexual nature. The observer will write down the time that each participant spends on each task, how much difficulty the participant had while completing each task (at a scale of 1 to 5), and if the task was completed or not. The tasks that the participants will need to complete are: 1. Check whether your system is up to date 2. Turn off add tracking. This prevents companies from using your browser data to give you personalized ads. 3. Turn off location tracking completely or for certain apps. 4. Access your cloud (icloud for iphone users, Google Drive for Android). 5. Turn off the automatic back-up function 6. Turn off the iphone keychain (iphone) or the function which codes your documents (Drive) There are two hypotheses in this research that need to be taken into account. First and foremost, one assumption is that the test group will give a better performance when it comes to the completion of the tasks. This means that they will either take less time in completing the tasks, they will complete more tasks, or they struggle less compared to the participants in the control group. The second hypothesis is that the test group will have a better understanding of how to secure their phone and why. This can be measured using the outcome of the second test. There should be a significantly larger improvement between the first and second test, compared to the control group, to support this hypothesis.

FEMALE PRIVACY AND CLOUD SECURITY 6 The independent variables are: age, study and the skill of the participant when it comes to their phone and its security. Age and study can be of influence. Knowledge can come with age or younger women might be better in securing their phones because of recent technological developments, instead. The study of the participant could be of importance since some studies have a higher regard for technology than others, which might influence the abilities of the participant. The last of these dependent variables is likely to have the most influence on the dependent variable. The dependent variable in this research is whether the subject can successfully secure their phone or not. The independent variables are measured using the questionnaires. The skill of the participant is measured based on the subject s own perception of their skills. Questions such as: Do you have an affinity for technology?, How well do you know your phone on a scale from 1 to 5? and Do you think that your phone is secured well? try to give a rough estimate of the participants skills about their phone usage. This estimate might have an influence on the participant s ability to secure their phone, which is why this is an independent variable. The dependent variable is measured by observing the participants while they complete the tasks. Results The results that are found will be discussed in this section of the document. There was a significant difference between the performances of the participants in the test group, compared to those in the control group. The observers classified the participant s abilities per task, by determining the amount of struggle that was seen in the participant (Figure 1+2). Figure 2: All over average times for the two groups needed to perform the tasks.

FEMALE PRIVACY AND CLOUD SECURITY 7 12 10 number of people 8 6 4 2 0 tasks 1 2 3 4 5 6 little rather little okay a lot very much STRUGGELING Figure 1: the control group performs the tasks with observations 12 10 number of people 8 6 4 2 0 tasks 1 2 3 4 5 6 little rather little okay a lot very much STRUGGELING Figure 2: the test group performs the tasks with observations From this figure, it is clear that people without the educational game, struggled more compared to those who could play the game. The differences are especially obvious for task 3 (Appendix C, TASK 3) and 5 (Appendix C, TASK 3). The test group had no issues at all in completing this task, while about half of the control group participants struggled on these same tasks. With task 2 both groups seemed to struggle. However, 70% of the participants of the control group struggled very much compared to 10% of the test group. Also 20% of the participants of the control group do not have any struggles at all, compared to 40% of the test participants. Therefor, based on the numbers, we can state that the test group performed better on average, compared to the control group.

FEMALE PRIVACY AND CLOUD SECURITY 8 6 29 34 5 9 48 task no. 4 3 12 16 23 28 2 32 72 1 17 31 control group test group time in seconds Figure 1: the control group performs the tasks with observations (Appendix C, TIME) The time spent per task was also measured. The average time needed per task can be found in Figure 3. For the second task, the control group needed a lot more time then the test group. The same goes for task 5. For task 4, the test group needed more time then the control group, on average, which is slightly surprising. Conclusion and discussion Concluding from this research, it can be said that the interference of a game is a positive teaching method. This, because the game caused a better performance under the participants, compared to the participants who did not use the game. It appears that the women who participated had a better understanding of how to secure their phone once done with the tasks in the game. They also thought they would use some of the things learned in the game, in the future. This is a very positive observation. However, the amount of participators (20 total, 10/10) is not a big enough sample to draw this conclusion over a larger group of people. Not enough information has been gathered for this research to actually qualify as valid. For further research, more participants need to be found. Also the game is quite simple. It fulfilled its use during the research, but on a bigger scale, it would be better to have a somewhat more professional game.

FEMALE PRIVACY AND CLOUD SECURITY 9 References Agarwal, R. (2013) Cyber Crime Against Women and Regulations in India. 3-1-2015 <http://www.tmu.ac.in/gallery/viewpointsdcip2013/pdf/track4/t-403.pdf> Dashora, K. (2011) Cyber Crime in Society: Problems and Preventions. Journal of Alternative Perspectives in the Social Sciences. 3 (1) 240-259 Finn, Jerry. 2004. A Survey of Online Harassment at a University Campus. Journal of Interpersonal Violence 19 ( 4 ): 468 483. Finn, J. & Banach, M. (2000) Victimization online: The downside of seeking human services for women on the Internet. CyberPsychology & Behavior. Halder, D. & Jaishankar, K. (2009) Cyber Socializing and Victimization of Women, Temida, p. 5-26. Katzman, D.K. (2010) Sexting: Keeping Teens Safe in a Technologically Savvy World. 3-1- 2015 <http://www.cps.ca/documents/position/sexting> Misra, R. (2013) Cyber Crime Against Women. 3-1-2015 <http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2486125> Mouaheb, H., Fahli, A., Moussetad & M., Eljamili, S. (2012) The Serious Game: What Educational Benefits?, Procedia Social and Behavioral Sciences, Vol.46, p.5502-5508

FEMALE PRIVACY AND CLOUD SECURITY 10 Stapleton, A.J. (2004) Serious Games: Serious Opportunities. Melbourne, VIC. Appendix A Checklist ethical permissibility of research. This version of the checklist is only to be used for proposed research conducted as part of the Cyber-crime Science Course. Items that are greyed-out should not be changed. If you would like to answer one of the greyed-out questions differently, you must complete the regular (full) checklist instead, which can be found on the web site of the ethical committee: http://www.utwente.nl/ewi/onderzoek/ethiekprotocol/ General When answering the questions, it is advisable to consult the chapter on standardized research (see the protocol on the web site of the ethical committee) because the answers will be considered with this in mind. 1. Title of the project: Cloud and phone safety awareness 2. Principal researcher: Pieter Hartel 3. Researchers: Jasmijn Kol, Dominik Terweh, Judith Weda 4. Department responsible for the research: EWI/SCS 5. Location where research will be conducted: University of Twente 6. Short description of the project (about 100 words): The research will explore whether cloud and phone security can be improved by playing a simple game guiding female users through their phone and maximize their safety as well as teaching the users about the importance of cloud and phone security. 7. Expected duration of the project and research period: 3 weeks 8. Number of experimental subjects: 30 9. EC member of the department: Roel Wieringa Questions about general requirements and conditions 1. Has this research or similar research by the department been previously submitted to the EC? Yes, No If yes, what was the number allocated to it by the EC? 2013-22 (See the Website of the Ethical Committee) 2. Under which category does the research fall with regard to the consideration of Medical / Not medical? Category D Category A Category B Category C Uncertain, explain why Explanatory notes: This is non-medical research with negligible risk, hence category D. 3. Are adult, competent subjects selected? Yes, indicate in which of the ways named in the general requirements and conditions this is so No, explain Uncertain, explain why Explanatory notes: Only females between the ages of 18 and 28 are selected to join this research

FEMALE PRIVACY AND CLOUD SECURITY 11 4. Are the subjects completely free to participate in the research, and to withdraw from participation whenever they wish and for whatever reason? Yes No, explain why not Uncertain, explain why Explanatory notes: Subjects are completely free to deny participating in the research and are free to leave at any time during their session. 5. In the event that it may be necessary to screen experimental subjects in order to reduce the risks of adverse effects of the research: Will the subjects be screened? Screening is not necessary, explain why not Yes, explain how No, explain why not Uncertain, explain why Explanatory notes: The risk for subjects is nil, hence no screening is required. 6. Does the method used allow for the possibility of making an accidental diagnostic finding which the experimental subject should be informed about? (See general conditions.) No, the method does not allow for this possibility Yes, and the subject has given signed assent for the method to be used Yes, but the subject has not given signed assent for the method to be used Uncertain, explain why Explanatory notes: 7. Are subjects briefed before participation and do they sign an informed consent beforehand in accordance with the general conditions? Yes, attach the information brochure and the informed consent form to be signed No, explain why not Uncertain, explain why Explanatory notes: 8. Are the requirements with regard to anonymity and privacy satisfied as stipulated in 5.2.7? Yes No, explain why not Uncertain, explain why Explanatory notes: All researchers will complete and sign a PII form (as attached to this document) to state that they will treat all data according to 5.2.7. of the protocol 9. If any deception should take place, does the procedure comply with the general terms and conditions (no deception regarding risks, accurate debriefing)? No deception takes place The deception which takes place complies fully with the conditions (explain) The deception which takes place does not comply with the conditions (explain) If deception does take place, attach the method of debriefing Explanatory notes: 10. Is it possible that after the recruitment of experimental subjects, a substantial number will withdraw from participating because, for one reason or another, the research is unpleasant? No Yes, that is possible Questions regarding specific types of standard research Answer the following questions based on the department to which the research belongs. 11. Does the research fall entirely within one of the descriptions of standard research as set out in the described standard research of the department? Yes, go to question 12 No, go to question 13

FEMALE PRIVACY AND CLOUD SECURITY 12 Uncertain, explain what about, and go to question 13 Explanatory notes: 12. Give a more detailed specification of the research. Provide all possible data that is relevant for an ethical consideration. I.e. is there any risk for stress for the subjects? If they self-select, explain how and consider any possible discomfort they may experience when taking part in the experiment. No deception will take place during the research. The game will be carefully designed as to not cause stress for the subject. Appendix B Description of the intervention The intervention was given to the test group, consisting of ten, randomly picked, female students between the ages of 18 and 30. The intervention was done by an educational game, or a playful guide. This would help the participants understand how to secure their devices as best as possible. The game will go through the following tasks: 1. Check whether your system is up to date 2. Turn off add tracking. This prevents companies from using your browser data to give you personalized ads. 3. Turn off location tracking completely or for certain apps. 4. Access your cloud (icloud for iphone users, Google Drive for Android). 5. Turn off the automatic back-up function 6. Turn off the iphone keychain (iphone) or the function which codes your documents (Drive) The tasks are explained by Jenny, a virtual personality that tells the users about the tasks and why these tasks are important to complete. Using screenshots from Android phones and iphones, the game guides the participant through all the steps that are necessary to take to complete each task. The participant can click through each task using the mouse button. Some screenshots of the intervention method can be found in Figure B1 and B2.

FEMALE PRIVACY AND CLOUD SECURITY 13 Figure B1: First question to be answered by the participant.

FEMALE PRIVACY AND CLOUD SECURITY 14 Figure B2: One of the tasks given to an iphone user. Appendix C Calculations for significance TASK 3: Calculations for the control group for the performance on task 3 For the test group the mean is 5 since there are only 5 in the sample. Since the mean of the test group is out of the boundaries of the 90% confidence interval we can say that the hypothesis that the game influences the performance of the players (in this case in task 3) is true with a probability of 90%.

FEMALE PRIVACY AND CLOUD SECURITY 15 TASK 5: Calculations for the control group for the performance on task 5 For the test group the mean is 5 since there are only 5 in the sample. Since the mean of the test group is out of the boundaries of the 95% confidence interval we can say that the hypothesis that the game influences the performance of the players (in this case in task 3) is true with a probability of 95%.

FEMALE PRIVACY AND CLOUD SECURITY 16 TIMES: Calculations for the control group for the testing times Calculations for the test group for the testing times Since the mean of the test group is out of the boundaries of the 85% confidence interval we can say that the hypothesis that the game influences the time of the tasks is true with a probability of 5%.