#0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ ·...

11
#0916612: Online Privacy and Senior Ci7zens: A SocioTechnical Mul7Perspec7ve Framework for Trustworthy Opera7ons InterCultural Privacy Comparison among the Older and Younger Genera<ons: Ponnurangam Kumaraguru, Sharmistha BagchiSen, Rajarshi Chakraborty, H. Raghav Rao and Shambhu J. Upadhyaya Older Adults and Privacy on Social Media: Rajarshi Chakraborty, Claire Vishik and H. Raghav Rao Aging and the Internet: usage, percep<on and behavior: Sharmistha BagchiSen, Rajarshi Chakraborty, H. Raghav Rao and Shambhu J. Upadhyaya Ehealth and Personal Health Informa<on Leakage: Ruchika Mehresh, Arun Keepanasseril, H.R.Rao and Shambhu J. Upadhyaya The Early (tweeting) Bird Spreads the Worm: An Assessment of TwiMer for Malware Propaga<on: Ameya Sanzgiri, Jacob Joyce, Shambhu Upadhyaya

Transcript of #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ ·...

Page 1: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

#0916612:  Online  Privacy  and  Senior  Ci7zens:  A  Socio-­‐Technical  Mul7-­‐Perspec7ve  Framework  for  Trustworthy  Opera7ons    

•  Inter-­‐Cultural  Privacy  Comparison  among  the  Older  and  Younger  Genera<ons:  Ponnurangam  Kumaraguru,  Sharmistha  Bagchi-­‐Sen,  Rajarshi  Chakraborty,  H.  Raghav  Rao  and  Shambhu  J.  Upadhyaya  

•  Older  Adults  and  Privacy  on  Social  Media:  Rajarshi  Chakraborty,  Claire  Vishik  and  H.  Raghav  Rao  

•  Aging  and  the  Internet:  usage,  percep<on  and  behavior:  Sharmistha  Bagchi-­‐Sen,  Rajarshi  Chakraborty,  H.  Raghav  Rao  and  Shambhu  J.  Upadhyaya  

•  E-­‐health  and  Personal  Health  Informa<on  Leakage:  Ruchika  Mehresh,  Arun  Keepanasseril,  H.R.Rao  and  Shambhu  J.  Upadhyaya  

•  The  Early  (tweet-­‐ing)  Bird  Spreads  the  Worm:  An  Assessment  of  TwiMer  for  Malware  Propaga<on: Ameya  Sanzgiri,  Jacob  Joyce,  Shambhu  Upadhyaya  

Page 2: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Inter-­‐Cultural  Privacy  Comparison  

Social  Influence  

Percep<on  of  Threat  to  Privacy  

Confidence  &  Exper<se  

Inten<ons  and  Ac<ons  that  

Protect  Privacy    

Aging  

?  

?  

Cultural  Differences  

Rela<onships  

?  

?  

Research  Challenge:  How  do  older  adults  living  in  the  East  get  influenced  by  their  children  living  in  the  West  in  their  aKtude  towards  InformaNon  Privacy  on  the  Internet?  

Ponnurangam  Kumaraguru,  Sharmistha  Bagchi-­‐Sen,  Rajarshi  Chakraborty,  H.  Raghav  Rao  and  Shambhu  J.  Upadhyaya  

Online  Shopping  

Online  Banking  

Keeping  in  touch  with  Family  

Govt  &  Medical  Informa<on  Seeking  

Email/Websites  

3rd  Party  

Personal  Informa<on  

Hackers  /  Virus  /  Untrusted  Par7es  

Privacy  Breaches  Older  Adults  Using  Internet  

Page 3: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Inter-­‐Cultural  Privacy  Comparison  

Privacy  in  Individualis<c  

Society  

Privacy  in  Collec<vist  Society  

Vs.  

Data  Collec<on   +  

Hofstede  2001  USA  is  an  

individualis<c  society  

India  is  a  collec<vist  society  

Dyadic  Parent-­‐Child  Rela7onships  Sharing  Knowledge  

Difference  in  Privacy  Percep7ons  

Immigrant  Child  with  

US-­‐based  Privacy  A]tude  

Older  Adult  Parent  with  India-­‐based  

Privacy  A]tude  

Ponnurangam  Kumaraguru,  Sharmistha  Bagchi-­‐Sen,  Rajarshi  Chakraborty,  H.  Raghav  Rao  and  Shambhu  J.  Upadhyaya  

Page 4: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Privacy  on  Social  Media  

Older Adults on Social Networking from 2009 to 2010:

22% to 42%

Research  Challenge:  Do  older  adults  take  privacy-­‐preserving  opt-­‐out  sharing  decisions  on  Social  Media  when  more  of  their  friends  do  the  same?  

Rajarshi  Chakraborty,  Claire  Vishik  and  H.  Raghav  Rao  

Facebook  Profile:    Ac<vi<es  &  Interests    Educa<on  &  Work    Sex  /  Rela<onship  Status    Loca<on    Photos  

Facebook  sharing  is  mostly  Opt-­‐Out  

Friend  1    Default  Sharing  

Friend  2  Opted  Out  

Friend  3  Opted  Out  

Collect  Facebook  Profile  Pages  (public  view)    Look  for  Keywords  (College/Work/Photos)    Compare  between  Older  Adult  &  Her  Friends  

Method  

Page 5: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Privacy  on  Social  Media  Rajarshi  Chakraborty,  Claire  Vishik  and  H.  Raghav  Rao  

Friends  Opt  Out  of  Public  Photo  Sharing  

Friends  Opt  Out  of  Publicly  Sharing  Employer  Info  

Older  Adult  Opts  Out  of  Public  Photo  Sharing  

Friends  Opt  Out  of  Publicly  Sharing  College  Info  

Older  Adult  Opts  Out  of  Publicly  Sharing  Employer  Info  

Older  Adult  Opts  Out  of  Publicly  Sharing            College  Info  

Higher  in  Males  than  in  Females  

Measure:  Similarity  Index  for  each  profile  aMribute  x  AUribute  x:  Photos  /  Employer  /  College  Xji  =  Binary  indicator  of  aMribute  for  Friend  j  for  older  adult  i  N(Fi)  =  #  of  Friends  of  older  adult  i  

Dependent  Variable:    Odds-­‐Ra<o  for  

Photos  /  Employer  /  College  

Similarity-­‐Index_X  

Future  Research      Conduct  Survey  to  measure  

privacy  concern  about  Facebook  sharing  

  Compare  percep<ons  and  a]tude  with  real  sharing  ac<ons  

  Seek  permission  to  measure  difference  in  sharing  between  different  levels  of  visibility    

Page 6: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Aging  and  the  Internet:  usage,  percep<on  and  behavior:  Sharmistha  Bagchi-­‐Sen,  Rajarshi  Chakraborty,    

H.  R.  Rao,  and  Shambhu  Upadhyaya  University  at  Buffalo  

Challenge  •  Understanding  internet  usage,  percep<on,  and  behavior  of  older  adults  with  a  specific  focus  on  privacy  and  security.  

•  Data  collected  from  online  survey  through  senior  centers,  support  groups,  and  clubs  for  older  adults   Sample  size:  117  

Page 7: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Data  Analysis  –  In  progress  

Survey  Items  •     Security  Awareness  –  dependent  variable:  Ability  to  differen<ate  

between  safe  and  unsafe  websites  •  Perceived  Cost  of  Security:    Privacy  protec<on/security  is  expensive  •  Perceived  Benefit  of  the  Internet:    It  is  worth  giving  out  personal  

informa<on  for  free  benefits  (e.g.,  shopping,  email)  •  Internet  Efficacy/Tech  confidence:    Sense  of  safety  on  the  Internet,  

ability  to  dis<nguish  what  is  suspicious/legi<mate  and  what  is  not  •  Risk  Aversion:    Uncomfortable  giving  out  personal  informa<on  •  Privacy  Concerns:    Online  privacy  is  users’  right  to  exercise  control  

and  autonomy  over  decisions  •  Cogni<ve  Aging:    Feeling  younger/older  than  current  age  •  Nostalgia  Proneness:    Tech  is  generally  improving  human  welfare  

 

Page 8: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

E-­‐health  and  Personal  Health  Informa<on  Leakage:  Ruchika  Mehresh,  Arun  Keepanasseril,  

H.R.Rao  and  Shambhu  J.  Upadhyaya  

•  Adop<on  of  EHRS  results  in  privacy/security  issues  –  Solu<on:   Introduc<on   of   compliance   procedures   like,  PHIPA,  HIPAA,  etc.  

–  Compliance  procedures   incur  excessive  overhead,  both   in  terms  of  opera<ng  cost  and  efficiency  

 •  Challenge  

–  To  develop  a   solu<on   that   focuses  on  quick   iden<fica<on  and  preven<on  of  informa<on  leak  

Page 9: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

E-­‐health  and  Personal  Health  Informa<on  Leakage  

•  Solu<on  under  inves<ga<on:  –  A  supplement  to  the  exis<ng  compliance  procedures  –  List-­‐based  detec<on  of  underlying  sources  of  informa<on  leak  in  health  informa<on  systems  

–  Each  item  of  the  list  corresponds  to  an  event  –  An   event   has   an   associated   list   of   possible   sources   of  informaNon  leak  to  be  checked  out  

–  Example  •  Event:  New  employee  hired  •  Possible   sources  of   informa<on   leakage:  Background  check,  access   privilege   modifica<ons   for   the   new,   as   well   as,   the  affected  employees,  etc.  

Page 10: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

   The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation Ameya Sanzgiri, Jacob Joyce, Shambhu Upadhyaya  Assessment  of  Twitter  for  Malware  Propagation    Malware  propagation  traditionally  through  

–  Emails  –  Links  in  wiki/web  forums  

Social  networking  provide  a  new  medium  – Paths  already  set  up  for  propagation  – Large  amount  of  information  @low  

•  Detection  is  dif@icult  – New  Medium  (not  lot  of  people  understand  intricacies)    

– Trust  built  between  people  through  years  of  interaction  

So  what  would  be  the  effect  of  malware  propagating  through  Twitter?  

 

Page 11: #0916612 Online,Privacy,and,Senior,Ci7zens:,ASocio ...precog.iiitd.edu.in/psosm_ · DataAnalysis"–In"progress" Survey"Items" • ""Security"Awareness"–dependentvariable:"Ability"to"differen

Twitter    Model

• Information  exchange  through  tweets.  • Can  be  broken  in  to  two  entities  

•  User  Follower:  High  Trust  •  #tag/trending  topic  followers  

•  Short  URL’s  in  tweets  obfuscate  information  •  Miscreants  can  insert  short-­‐URLs  to  malware  sites  and    

•  Leverage  trust  between  users  to  entice  click  on  links    •  Even  with  low  degree  of  connectivity  and  low  probability  of  clicking  links,  such  malware  propagation  would  be  rampant  

•  Modeled  using  epidemic  theory    •  Effect  too  devastating  to  ignore.  More  research  is  needed  to  analyze  the  risk  of  attack.  

This  work  will  appear  in  proceedings  of  MobiWIS,  2012.