<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>2026 Posts | Kami Vaniea</title>
    <link>https://vaniea.com/post/2026/</link>
      <atom:link href="https://vaniea.com/post/2026/index.xml" rel="self" type="application/rss+xml" />
    <description>2026 Posts</description>
    <generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Tue, 19 May 2026 12:18:48 -0400</lastBuildDate>
    <image>
      <url>https://vaniea.com/media/icon_hu1994206880166008227.png</url>
      <title>2026 Posts</title>
      <link>https://vaniea.com/post/2026/</link>
    </image>
    
    <item>
      <title>Security and Human Behavior 2026 Day 2</title>
      <link>https://vaniea.com/post/2026/shb-day2/</link>
      <pubDate>Tue, 19 May 2026 12:18:48 -0400</pubDate>
      <guid>https://vaniea.com/post/2026/shb-day2/</guid>
      <description>&lt;p&gt;Welcome to the 19th Security and Human Behavior. The write-up below is a live-blog of the workshop.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contents:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#session5&#34;&gt;Session 5: Organizational Security&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Carolin Lämmle, Ryan Wright, David Reeves, Samantha Phillips,  Tony Vance, Laura Arno&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session6&#34;&gt;Session 6: Trust and Security Public Policy&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Joseph Bonneau, Kami Vaniea, Serge Egelman, Jayati Dev, Michele Massberg, Ryan Shandler&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session7&#34;&gt;Session 7: Public Policy and Privacy&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: David Sidi, Avinash Collis, Geoff Tomaino, Andrew Odlyzko, Tawfiq Alashoor, Blase Ur&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session8&#34;&gt;Session 8: Where Do We Go From Here?&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Sascha Romanosky, Susan Landau, Jean Camp, Matt Blaze, Alessandro Acquisti, Jeremy Epstein&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Also see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/shb/2026/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Schneier&amp;rsquo;s SHB 2026 Page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2026 &lt;a href=&#34;https://vaniea.com/post/2026/shb-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/2026/shb-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2025 &lt;a href=&#34;https://vaniea.com/post/2025/shb-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/2025/shb-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2024 &lt;a href=&#34;https://vaniea.com/post/shb-2024-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/shb-2024-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session5&#34;&gt;Session 5: Organizational Security&lt;/h1&gt;
&lt;p&gt;Speakers: Carolin Lämmle, Ryan Wright, David Reeves, Samantha Phillips, Tony Vance, Laura Arno&lt;/p&gt;
&lt;h3 id=&#34;carolin-lämmle&#34;&gt;Carolin Lämmle&lt;/h3&gt;
&lt;p&gt;Title: System Administrators - Power, Gender, and Ethics&lt;/p&gt;
&lt;p&gt;Systemadmins - interviews with 11 male administrators then later a study of 13 female system administrators.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unsuprisingly female system adinistrators are not common on teams leading to many issues&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Surveyed a larger set of system administrators (32 Women, 216 men, 7 other)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;I am in a powerful position &amp;lt;- both genders agree they have power, are irreplaceable, respected by suepervisors, relied on for advice, and comfortable with with giving orders. They also were self-aware that they could do quite a bit of dammage.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Struggles with doing things &amp;ldquo;quick and dirty or the right way&amp;rdquo;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Honor code seen as important&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Gender differences:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Men more likely to say &amp;ldquo;I have skills no one else have&amp;rdquo;&lt;/li&gt;
&lt;li&gt;Women less likely to agree that they have special skills, are competent&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/3772318.3791380&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;“Technically speaking I&amp;rsquo;m at the top of the hierarchy”: How System Administrators Think About Power&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/3544549.3585648&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;“You’re not smart enough for it. You can’t do it anyway.” - Experiences and Coping Strategies of Female System Administrators&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;ryan-wright&#34;&gt;Ryan Wright&lt;/h3&gt;
&lt;p&gt;Title: Does compliance Actually Reduce Cyber Incidents: Two decades of acadiemic research. Seven CISOs.&lt;/p&gt;
&lt;p&gt;How much did your organization spend on compliance training, awareness, and policy enforcement last year? Evidence?&lt;/p&gt;
&lt;p&gt;Does compliance actually matter? Maybe it is the wrong construct.&lt;/p&gt;
&lt;p&gt;Pre-registered study. Which is challenging to do.&lt;/p&gt;
&lt;p&gt;When talking to CISOs about what is working and what is not working for them. Issues like influence, trust, shared goals, regular communication and genuine partnership. AKA &lt;a href=&#34;https://en.wikipedia.org/wiki/Social_capital&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Social Capital&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Findings&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Compliance didn&amp;rsquo;t move the needle&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;Compliance does matter for smaller organizations, so having compliance does matter, but adding more maybe doesn&amp;rsquo;t&lt;/li&gt;
&lt;/ul&gt;
&lt;ol start=&#34;2&#34;&gt;
&lt;li&gt;Shared social capital is big&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;If both cyber and business and social capital are high and balance - then less odds of a severe breach&lt;/li&gt;
&lt;/ul&gt;
&lt;ol start=&#34;3&#34;&gt;
&lt;li&gt;Who benifits the most&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;Big organizations need more social capital&lt;/li&gt;
&lt;li&gt;Top management doesn&amp;rsquo;t understand cybersecurity plan? It will probably fail.&lt;/li&gt;
&lt;li&gt;Security teams that act as community members are more effective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;ldquo;Security leadership increasingly resembles community stewardship&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Compliance is important to get security up to a certain level, but past that there are limited returns from just compliance.&lt;/p&gt;
&lt;h3 id=&#34;david-reeves-virginia-tech&#34;&gt;David Reeves (Virginia Tech)&lt;/h3&gt;
&lt;p&gt;Both a PhD student and a CISO&lt;/p&gt;
&lt;p&gt;Behavioral distortions in organizational cybersecurity decision-making&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Impact of anticipatory feelings on organizations cybersecurity decision-making&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.emerald.com/itp/article-abstract/32/1/171/183213/The-role-of-cognitive-biases-in-anticipating-and?redirectedFrom=fulltext&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Impact of cognitive biases on organizations downplay escalating security warning signs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What level of risk is acceptable? Having these conversations at the board-level is complex.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.nbcnews.com/tech/security/national-guard-was-hacked-chinas-salt-typhoon-group-dhs-says-rcna218648&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;National Guard hacked by Chinese &amp;lsquo;Salt Typhoon&amp;rsquo; campaignfor nearly a year, DHS memo says&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Large data breach&lt;/li&gt;
&lt;li&gt;State said that acceptable risk was at a certain level, but the on the ground decisions did not match that high level goals&lt;/li&gt;
&lt;li&gt;Money saving was an aspect&lt;/li&gt;
&lt;li&gt;Costs of breach were serious and not necessarily properly thought about before hand
&lt;ul&gt;
&lt;li&gt;Loss of trust with partners - long term loss&lt;/li&gt;
&lt;li&gt;Reassigned employees from other projects to handle the situation&lt;/li&gt;
&lt;li&gt;High levels of burnout&lt;/li&gt;
&lt;li&gt;Admins took lots of blame, even though the risk decisions were taken by others&lt;/li&gt;
&lt;li&gt;Breach costs like having to pay for LiveLock for people who&amp;rsquo;s data was lost.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Core argument: Organizational leaders rely on cognitive biased interpretations that systematically distort cybersecurity risk perception.&lt;/p&gt;
&lt;p&gt;Mixed method study: quantitative data such as financial, ceybrersecurity assessment results, incident informaiton, organizational environmental data. Qualitative data like grounded theory interviews of populations like CEOs, CFOs, CIO, and CISOs.&lt;/p&gt;
&lt;h3 id=&#34;samantha-phillips-the-university-of-tulsa&#34;&gt;Samantha Phillips (The University of Tulsa)&lt;/h3&gt;
&lt;p&gt;Imagine two organizations A and B and the same security intervention is used at both, but the outcome is quite different. What about security culture is causing such a difference in how an intervention is recieved?&lt;/p&gt;
&lt;p&gt;Used:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hofstead&amp;rsquo;s Organizational Culture Dimensions&lt;/li&gt;
&lt;li&gt;Schein&amp;rsquo;s Three-Level Model of Culture&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Research study with survey study and follow-up interviews.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Employees did think that the company cared about security, but they were unsure if they would actually get any help if something happened&lt;/li&gt;
&lt;li&gt;Leadership story
&lt;ul&gt;
&lt;li&gt;Operations leader, deployed security cameras in a site, then security team found out. Security team didn&amp;rsquo;t approve, and opperations had to remove the cameras. Leading to frictions and tensions in the culture.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Another story
&lt;ul&gt;
&lt;li&gt;Security team depoloyed MFA, so they sent it out to the rest of the company&lt;/li&gt;
&lt;li&gt;But&amp;hellip;. many employees did not have phones, lots of worked sites had no cell service. So MFA caused bad security behaviors like everyone using the one account they could get logged in.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Take aways&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Measuring the type of information security culture is important to target interventions
&lt;ul&gt;
&lt;li&gt;Easy going culture may not match well with a strict security intervention&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Assess culture from multiple dimensions/perspectives&lt;/li&gt;
&lt;li&gt;Consider measuring pre/post to understand how an intervention is impacting a culture&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;tony-vance-virginia-tech&#34;&gt;Tony Vance (Virginia Tech)&lt;/h3&gt;
&lt;p&gt;Title: Rethinking security culture&lt;/p&gt;
&lt;p&gt;Story: &lt;a href=&#34;https://www.reuters.com/technology/chinese-hackers-accessed-government-emails-microsoft-says-2023-07-12/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Microsoft compromised by Chinese hackers&lt;/a&gt; including gaining access to a private key - which is very not good&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enbled attackers to access email addresses of many organizations that use Microsoft email products&lt;/li&gt;
&lt;li&gt;Review was done and publicly released
&lt;ul&gt;
&lt;li&gt;Found that security culture needs to be improved at Microsoft&lt;/li&gt;
&lt;li&gt;But what is &amp;ldquo;securiyt culture&amp;rdquo;? Report did not define the term.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Risk management &lt;a href=&#34;https://www.thefreelibrary.com/Risk&amp;#43;Management/1989/January/1-p52082&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;maybe this one&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Measuring scales for culture&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security education and awareness - good overlap among scales&lt;/li&gt;
&lt;li&gt;Many other constructs measure a range of things. 83 different constructs found in the review&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some constructs are correlates, some are determinants, and some outcomes. These are different aspects entirely.&lt;/p&gt;
&lt;p&gt;Design of survey scales are not at the level of modern scale development. Issues like properly validating the scale to make sure it measures what the authors intended. It is important that participants answer questions in a way that matches the researcher understanding, if this is not tested then there may be a big issue.&lt;/p&gt;
&lt;p&gt;A scale development cycle:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Conceptual definition&lt;/li&gt;
&lt;li&gt;Dimensioality specification&lt;/li&gt;
&lt;li&gt;Item generation&lt;/li&gt;
&lt;li&gt;Content validity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Wants to improve how culture is measured so organizations can not only say they want to improve, but measure what their current state looks like.&lt;/p&gt;
&lt;h3 id=&#34;laura-arno&#34;&gt;Laura Arno&lt;/h3&gt;
&lt;p&gt;Talk: How security Policy Motivates Computer Abuse: Organizatoinal Technology Injustice&lt;/p&gt;
&lt;p&gt;Overly tight security policies can lead to shadow IT, where users go around the security and setup their own IT which then results in overall lower security.&lt;/p&gt;
&lt;p&gt;Insider threats&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mone going towards employee monitoring and surveillance as a way of mitigating threats.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Tensions between the IT and the non-IT employees. This an cause computer abuse.&lt;/p&gt;
&lt;p&gt;Lots of research focuses on compliance as an outcome. But recent research is calling this into question. Measuring non-compliance is also becoming something to measure. But non-compliance is often conflated with negligence, cyberloafing, violation and computer abuse. But much of non-compliance is closer to work-arounds of overly strict security policies that make day-to-day work very challenging. We should consider measuring non-compliance as a metric of how badly a policy mismatches with employee needs and willingness.&lt;/p&gt;
&lt;p&gt;Many employees are not aware of the policies. But they know what they think the policies are. They may only know that the policy is restricting them, that they have lost control, and that they do not like them.&lt;/p&gt;
&lt;p&gt;Perceptions of the restrictons is driving their behavior.&lt;/p&gt;
&lt;h3 id=&#34;qa&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;If we talk about cognitive biases, are we suffering from them? Is phishing really the biggest risk? CISOs are doing training/compliance because NIST has said so. Are we the biased ones? Should be re-assessing good protections?
&lt;ul&gt;
&lt;li&gt;Yes: having academic conversations where we have crazy conversations and then testing them is really great. It causes a slow building of understanding that is very valuable.&lt;/li&gt;
&lt;li&gt;It is hard to measure security culture, especially if it is a suplier that was hacked&lt;/li&gt;
&lt;li&gt;We spend all this time and energy on barriers. But we need better partnership with employees. Reporting and response are also super important. It isn&amp;rsquo;t all up-front protection.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;For Laura - you mentioned shadow IT and that the policies are unjust
&lt;ul&gt;
&lt;li&gt;Studying more than compliance is important. Shadow IT is very much a thing. It is possible to both be compliant (long password changed often) and not in compliance (password written on white board because no one can memorize it).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Social capital
&lt;ul&gt;
&lt;li&gt;Ryan: in our study we had the two roles measure each other&amp;rsquo;s social capital. It was important to see not just how people see themselves, but also how other see them.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;It is not that compliance does not work, the issue is that compliance is not done correctly. Box ticking vs finding underlying problem and addressing it. In lawsuits: a security report is often based on a CISO answering a questionare, not based on what was actually going on.
&lt;ul&gt;
&lt;li&gt;We need to re-think what compliance actually is.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Relational governance - social capital. It was interesting in our case we saw that you cannot order people like tenured professors or members of parlement. So social capital is vital to get security actually done. How do CISOs navigate the changing roles
&lt;ul&gt;
&lt;li&gt;Ryan: CISOs: they feel they need to empower users, empower business units, and they need a shared risk model&lt;/li&gt;
&lt;li&gt;David: It is imporant as a CISO is to weirdly not be a technologist. But in a CISO role the position is to be a collaborative leader, not a technologist. And to figure out how risks are applied to the company&amp;rsquo;s business function. Role is to think about what the organization risks are not the IT risks.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;To Ryan: In political economy people focus quite a bit on trust because it can be measured and put in a model. Would it help to start with trust in these measures of social capital and collaboration within an organization.&lt;/li&gt;
&lt;li&gt;When I think about security culture I think about &amp;ldquo;I know it when I see it&amp;rdquo;. How much cluture is based on the technology of the moment and how much is actually culture.
&lt;ul&gt;
&lt;li&gt;Hopefully not the technology, because that is always changing. Culture also changes over time. So both are combined.&lt;/li&gt;
&lt;li&gt;They are quite independent. Even if a tech stack was swapped out the culture should persist, though it would need to adapt.&lt;/li&gt;
&lt;li&gt;At home I&amp;rsquo;m productive (no restrictions) at work I&amp;rsquo;m quite restricted so I&amp;rsquo;m less productive.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session6&#34;&gt;Session 6: Trust and Security Public Policy&lt;/h1&gt;
&lt;p&gt;Speakers: Joseph Bonneau, Kami Vaniea, Serge Egelman, Jayati Dev, Michele Massberg, Ryan Shandler&lt;/p&gt;
&lt;p&gt;Notes in this session were done by my incredible student due to me being in the session.&lt;/p&gt;
&lt;h3 id=&#34;joseph-bonneau&#34;&gt;Joseph Bonneau&lt;/h3&gt;
&lt;p&gt;Title: Cryptographically Verifiable Lotteries&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Making lotteries verifiable for cryptography&lt;/strong&gt;
Lotteries are used for many purposes like moose hunt lottery for hunting permits, judge assignments, conscription, and security screening
Case Studies: biased randomness
US conscription lottery, 1969: those with later birth months were not selected
Diversity visa program, 2011: results are void as it was biased&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can we achieve a verifiable lottery?&lt;/strong&gt;
Physical randomness ceremonies: the issue with this is that physical randomness can be faked: hot and cold balls used to aid cheats
Randomness from natural phenomena or stock market from asset prices
Levels of Verifiability:
Using cryptography we can use multiparty randomness beacon protocol (i.e. League of Entropy) the trust model here is that if a majority of them is good the randomness will work well&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Participatory protocols:&lt;/strong&gt;
Only 1 of n correct participants needed for security but no security downside to adding participants&lt;/p&gt;
&lt;h3 id=&#34;kami-vaniea&#34;&gt;Kami Vaniea&lt;/h3&gt;
&lt;p&gt;Many conferences this year are struggling with high submission rates and potentially AI generated content&lt;/p&gt;
&lt;p&gt;What is SOUPS: Symposium on Usable Privacy and Security
SOUPS is focused on human factors of security and privacy technologies and have started in 2005. Kami was technical paper chair for 2025 and 2026.&lt;/p&gt;
&lt;p&gt;There has been a boom of paper submissions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2024 was 156 submissions with 21% accepted&lt;/li&gt;
&lt;li&gt;2025 was 157 submissions with 19% accepted&lt;/li&gt;
&lt;li&gt;2026 was 251 submissions with 15.5% accepted&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;251 submissions and 15.5% (39 accepted submissions( and 3 main reasons for number of submissions)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AI may be a culprit here - its a common source of blame this year&lt;/li&gt;
&lt;li&gt;CORE ranking- SOUPS was just raised to A-level in late 2025 (being A-level is a big deal)&lt;/li&gt;
&lt;li&gt;Location being in Germany&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Statistics:
Kami asked reviewers to let us know about problematic AI and some issues identified included mangled references, fabricated references, citing text does not agree with cited paper, or poorly written text or text that does not match the rest of the paper&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;18 flagged by reviewers as possibly having problematic AI&lt;/li&gt;
&lt;li&gt;12 rejected in round 1&lt;/li&gt;
&lt;li&gt;3 rejected in round 2&lt;/li&gt;
&lt;li&gt;3 accepted both were flagged for having potentially AI generated text
Problem: we never looked this closely at references before&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Step 11: SOUPS will be using student volunteers to review the output of reference checkers for all accepted papers!&lt;/p&gt;
&lt;h3 id=&#34;serge-egelman&#34;&gt;Serge Egelman&lt;/h3&gt;
&lt;p&gt;Title: Is it time for software to put on its big boy pants?&lt;/p&gt;
&lt;p&gt;Most engineering depends on complex supply chains: Apple doesn’t make glass, Toyota doesn&amp;rsquo;t make brake pads
Airlines use chicken cannons to test airline parts.
For engineering software, you should be using ⅙ of the time coding and most of the time in planning and validation. Products must list ingredients and/or share any hazardous ingredients but this doesn’t exist in software. Part of the problem is that “developers usually choose which corporates they incorporate and compliance / QA folks may be left in the dark”.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.ftc.gov/system/files/documents/public_events/1415032/privacycon2019_serge_egelman.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System - Submitted to FTC PrivacyC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some developer SDKs take location Data and there is a paper on this&lt;/p&gt;
&lt;p&gt;Awareness of app behaviours and some developers just did not know
Data sent to measurelib.com and it was linked to a defense contractor and there is a book by Bryan Tau on this topic
&lt;a href=&#34;https://www.usenix.org/system/files/usenixsecurity23-lyons.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.usenix.org/system/files/usenixsecurity23-lyons.pdf&lt;/a&gt;
Physical products that cause harm when used as intended are subject to recalls yet we don’t have this for software&lt;/p&gt;
&lt;p&gt;Methods for accountability exist: civil engineers are licensed
Where do we go from here?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SBOMs&lt;/li&gt;
&lt;li&gt;ONCD organized a working group to come up with a framework for software liability&lt;/li&gt;
&lt;li&gt;Maybe engineers need to be professionally licensed&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;jayati-dev&#34;&gt;Jayati Dev&lt;/h3&gt;
&lt;p&gt;Title: Multistakeholder approach to open source policy&lt;/p&gt;
&lt;p&gt;Open source software is everywhere and for maintainers the bigger is gets the harder it is to maintain and for users there is usage in insecure context and hard to get support&lt;/p&gt;
&lt;p&gt;Can we add policy “rocks” for modern infrastructure/ open source software as many policy conversations happen in silos. What would a multi stakeholder policy approach look like for open source? At cybersecurity policy workshops they had breakout sessions with academic, industry, and government 20-25 participants&lt;/p&gt;
&lt;p&gt;Initial Findings: a case study to understand the 3 way communication participation via a conservatorship model to fund critical open source, joint bug bounty programs, and support secure implementation of open source. Liabilities and how do we assign liability and who do we assign liability protections for researchers. Having IP and safe harbor protections for open source developers&lt;/p&gt;
&lt;p&gt;Plan to convert this to a formal study, conduct more workshops, and collaborate on evidence based research&lt;/p&gt;
&lt;h3 id=&#34;michele-massberg&#34;&gt;Michele Massberg&lt;/h3&gt;
&lt;p&gt;Title: Decrypting Covert Operations: Human Factors in Cryptographic Design&lt;/p&gt;
&lt;p&gt;This study presents the first known decryption of Covert Operations panels and the problem:&lt;/p&gt;
&lt;p&gt;In order to decrypt this: they transcribed the sculpture to string representation in Python 3.12.0
And then ran statistical analysis and computed annotation using leiden conventional sigla (Dow 1969). If a certain symbol was missing, they would use a different symbol.&lt;/p&gt;
&lt;p&gt;Looking at these statistics, the arabic panel looked like it was plain text and english, cyrillic, and 3rd language looked like something else. After a bruteforce comparison, she used a ciphertext only key search and was able to decrypt this text and reconstructed and cracked it again.&lt;/p&gt;
&lt;p&gt;For the 4th panel, a reconstruction of the plain text using key and line number. Through reconstruction of cyrillic panel, it was an executive order during the cold war.&lt;/p&gt;
&lt;p&gt;This work provides the first complete technical resolution of the four Covert Operation panels. resolution of the four Covert Operations panels. Across both the English and Cyrillic reliefs, the ciphertexts were found to be consistent with periodic polyalphabetic substitutions, implemented as keyed Vigenère variants. The cipher design reflects the practical constraints of artistic design, manual inscription and a preference for mnemonic, thematically aligned keys.&lt;/p&gt;
&lt;h3 id=&#34;ryan-shandler&#34;&gt;Ryan Shandler&lt;/h3&gt;
&lt;p&gt;Title: Destabilizing Democracy: The Long term societal effects of cyber operations&lt;/p&gt;
&lt;p&gt;When we think of the impact of cyber attacks and threats, computer scientists think of denial of service, degraded infra, data theft but Ryn thinks about societal divisions, distrust in government institutions, elevated perception of threat, and support for anti-democratic policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Phase 1: Attacks arouse psychological distress&lt;/strong&gt; (increased anxiety levels)
For individuals who are not technologically adept, they express significant anxiety&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Phase 2: Emotional reaction triggers behavioural/political shifts&lt;/strong&gt;
Cyberattacks even when they don’t cause a lot of damage, for political feelings cause signficiant damage and impact&lt;/p&gt;
&lt;p&gt;Weaponizing this phenomenon? DARPA shared that foreign entities could use this research to launch attacks against the US. This may be similar to a termite attack.&lt;/p&gt;
&lt;p&gt;Behavioural Model of long term societal effects triggered by adversarial cyberattacks and there is always an effect that happen immediately afterwards.&lt;/p&gt;
&lt;p&gt;The experiment that starts tomorrow will have 5000 participants experience the treatment/control and record short term, medium term, and long term effects over the next 5 years. Some attack source will be China or unknown source or damage to mobile networks (shutting down internet access) or US response = partisian divisions. This will be consumed via social media feeds and long term news sources. For individual effects it’s usually seen for 1-2 months but will see a long term observation of societal effects and multi country analysis. How do we mitigate democratic destabilization.&lt;/p&gt;
&lt;p&gt;Results will be shared at SHB 2027!&lt;/p&gt;
&lt;h3 id=&#34;qa-1&#34;&gt;Q&amp;amp;A:&lt;/h3&gt;
&lt;p&gt;Ryan was asked, “Do you think there will be something similar to the Baader-Meinhof phenomenon for cyberattacks: If you buy a car, you see the car continuously” there isn’t just one cyberattack it’s whats the effect of one cyberattack followup in your daily life and maximizing external control and impacts in the long term&lt;/p&gt;
&lt;p&gt;Question for Kami, “NSF has banned from using AI to assess anything about them. What would you do for 50,000 proposals that are to decide to spend $0-50 billion dollars?” If it’s purely AI generated, it’s a lot easier to check them and be cruel in the punishment. The discussion sections suffered far more from AI and they used AI for the sections where it’s the hard part where you have to think about it. We need policies on this. There was discussion on requiring a DOI for each citation for paper submissions and avoid having to revoke any papers due to a hallucinated reference.&lt;/p&gt;
&lt;p&gt;Ryan got asked, “With so many cyberattacks already in the news, why will this particular treatment have a great impact?”. Ryan says his expectation is that they are trying to create a larger scale of cyberattacks and be realistic that it will break through the media cycle. They are taking a real attack and amplifying it a bit to see if their anxiety will be amplified so participants can look it up later (and be asked about this).&lt;/p&gt;
&lt;p&gt;Kami was asked, “One of the references was not real when they submitted a paper and when they used AI to edit the paper it changed the name of the paper.” Kami said this could be a good learning opportunity for students and researchers.&lt;/p&gt;
&lt;p&gt;Kami was asked, “Should this be handled by a higher level?” Kami said it hasn’t bubbled up yet and everyone is trying to handle it this year frantically. Another question, “I’ve had an issue with AI generated reviews, is this an issue with SOUPs?” Kami said some reviewers will not be asked back and only 1 reviewer she had a suspicion used AI due to lack of content and constructive feedback. “Across Security and Privacy papers, the people who are writing the Discussions sections just don&amp;rsquo;t seem as developed?” Kami got another question, “At the end of the day, we shouldn’t hate those who use AI but at the end of the day we should care if a paper is using AI but care about the quality and be smart about evaluating quality”&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session7&#34;&gt;Session 7: Public Policy and Privacy&lt;/h1&gt;
&lt;p&gt;Speakers: David Sidi, Avinash Collis, Geoff Tomaino, Andrew Odlyzko, Tawfiq Alashoor, Blase Ur&lt;/p&gt;
&lt;h3 id=&#34;david-sidi&#34;&gt;David Sidi&lt;/h3&gt;
&lt;p&gt;Access, Privacy, and Conviality with We Build Networks&lt;/p&gt;
&lt;p&gt;Tech for advancing values &amp;gt; Broader Access to powerful tech &amp;gt; institutional support &amp;gt; participipator &amp;gt; enthusiastic&lt;/p&gt;
&lt;p&gt;Working on making networking and networking tools more accessable to people. Workshops on topics like ToR node setup.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;We build networks&amp;rdquo; working with public groups to do educations.&lt;/p&gt;
&lt;h3 id=&#34;avinash-collis&#34;&gt;Avinash Collis&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://pubs.aeaweb.org/doi/pdf/10.1257/aeri.20240452&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;The consumer welfare effects of Online Ads: Efvidence from a 9-year experiment&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Ads&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Positive for users - informational role, match buyers and sellers&lt;/li&gt;
&lt;li&gt;Negative - higher prices, hyper focused&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facebook&amp;rsquo;s internal A/B testing platform has a small number of users who never see ads. They do this for experiment purposes. They recruit people from the ads and no ads. Do an incentivisation study by paying them to not use Facebook. In theory this will help determine how valuable ads are financially.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;Would you be willing to stop using Facebook for one month for $40?&amp;rdquo;&lt;/p&gt;
&lt;p&gt;No significant differences between ads and no ads group. Both gropus value Facebook at about $31/month.&lt;/p&gt;
&lt;p&gt;In the next project: how does this generalize across othe internet? How about other platforms. Also targeted vs non-targeted ads. This study looked at willingness to keep being in their condition. This experiment is mid-way.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Users in the ad blocking condition (where people have ad blockers) group want higher payments to keep using the system - this means that they are less willing to keep using the advertising blockers than put up with ads&lt;/li&gt;
&lt;li&gt;Those who experience ad-blocking&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;geoff-tomaino&#34;&gt;Geoff Tomaino&lt;/h3&gt;
&lt;p&gt;Title:  The role of preference ordering in consumer privacy violation perceptions&lt;/p&gt;
&lt;p&gt;The value consumers get out of advertisement&lt;/p&gt;
&lt;p&gt;First-order preference: What do you want?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;When you went out for lunch, you wanted a sandwich.
Second-order preference: What you want to want&lt;/li&gt;
&lt;li&gt;They want to want things that they don&amp;rsquo;t actually want&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;People take the view that advertisements represent what the brand thinks my first-order preferences are?&lt;/p&gt;
&lt;p&gt;For topics like news, food, people often want to want something other than what they really want.&lt;/p&gt;
&lt;p&gt;Study 1:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We asked to imagne thy used an investing site named Finance&lt;/li&gt;
&lt;li&gt;FinanceWise recommendation: Low-risk investments&lt;/li&gt;
&lt;li&gt;Gave other recommendations that match first or second order preferences&lt;/li&gt;
&lt;li&gt;Found mismatch condition makes people feel like a privacy invasion&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Study 2:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Your recommendation for&lt;/li&gt;
&lt;li&gt;First order: indulgent foods&lt;/li&gt;
&lt;li&gt;Second order preference Healthy OR indulgent foods&lt;/li&gt;
&lt;li&gt;How do people feel about&lt;/li&gt;
&lt;li&gt;More of a violation when ad goes against second order preferences&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;andrew-odlyzko&#34;&gt;Andrew Odlyzko&lt;/h3&gt;
&lt;p&gt;Title: Where is our society and economy going?&lt;/p&gt;
&lt;p&gt;The modern erra might be named after Turing from Turing Pharmaceuticals who managed to massively marked up the drug. Amazingly the drug was a generic drug.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Government has sorta given up on anti-trust enforcement - not just current administration&lt;/li&gt;
&lt;li&gt;Increasing volume of information - information in the eoconomy as well as private information
&lt;ul&gt;
&lt;li&gt;Cartels&lt;/li&gt;
&lt;li&gt;Growing part of the economy is corperate profits&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Lots of this has to do with the great enrichment of communities. The industrial revolution.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The market as you think about Adam Smith&amp;rsquo;s conception. market depends on a certain amount of capacity. Buyers and sellers come together where it is all about quantity and price.&lt;/li&gt;
&lt;li&gt;But now with more information available. Now the incentive is to get as much info about your buyers as possible.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Price descrimination is becoming more of a thing. Most of it is done is hidden forms. But this is very unpopular with the public. So most of it is hidden.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get credit card data on potential employees so they can decide who is desperate enough for a low paying job.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;tawfiq-alashoor&#34;&gt;Tawfiq Alashoor&lt;/h3&gt;
&lt;p&gt;Title: Securing Digital Transformation in the Age of AI: Behavioral Privacy Penetration Testing&lt;/p&gt;
&lt;p&gt;Long ago no one understood the value of salt. Then it became rare, and became a traded form of money. Solariam (salt) causing &amp;ldquo;salary&amp;rdquo;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve heard that data is the new money. The value of personal data is raising like enver before.&lt;/p&gt;
&lt;p&gt;We do allot of security penetration testing, but we don&amp;rsquo;t think about ethical ways to test the human brain to find vulnerabilities.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://nordpass.com/most-common-passwords-list/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Passwords are very predictable&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In cybersecurity we want to avoid a single point of failure. But our testing is focused on the technology, the firewalls. This single point of failue manifests through bad privacy decisions.&lt;/p&gt;
&lt;p&gt;We asked 2k people a set of questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Subjects that were not primed to privacy and not nudged to privacy answer less questions than those who were primed and nudged&lt;/li&gt;
&lt;li&gt;Even with small sample sizes we see the same thing&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://ieeexplore.ieee.org/abstract/document/10273938&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;An online randomized field experiment on the importance of privacy education, training, and awareness (PETA)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;When a robot violates privacy who is to blame&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Consumers blame robot&lt;/li&gt;
&lt;li&gt;Companies blame other companies&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;AI arms race&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;contact with AI is social media (attention)&lt;/li&gt;
&lt;li&gt;contact with AI is GenAI (intimacy)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Privacy is Dead &amp;lt;- today&amp;rsquo;s myth&lt;/p&gt;
&lt;h3 id=&#34;blase-ur-university-of-chicago&#34;&gt;Blase Ur (University of Chicago)&lt;/h3&gt;
&lt;p&gt;Title: What could data subject access rights be?&lt;/p&gt;
&lt;p&gt;Built a Tracking Transparency Tool&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/3319535.3363200&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Oh, the places you&amp;rsquo;ve been! User reactions to longitudinal transparency about third-party web tracking and inferencing&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;US FTC&amp;rsquo;s FIPP&amp;rsquo;s&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Notice - historical focus&lt;/li&gt;
&lt;li&gt;Choice - historical focus&lt;/li&gt;
&lt;li&gt;Access - interesting future focus by us&lt;/li&gt;
&lt;li&gt;Integrity&lt;/li&gt;
&lt;li&gt;Enforcement&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;When you download your Twitter data there is this targeting.js file explaining targeting ads. More data here than in the public user interface on why this ad.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.usenix.org/conference/usenixsecurity20/presentation/wei&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;What Twitter knows: Characterizing ad targeting practices, user perceptions, and ad explanations through users&amp;rsquo; own Twitter data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facinating targeting stats. Including things like race.&lt;/li&gt;
&lt;li&gt;This is sorta public data, why are people not looking at it?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;When you download data you get a huge zip file or a huge file. How do you parse.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Some files were millions of chars but no line breaks&lt;/li&gt;
&lt;li&gt;Very hard to parse, hard to read&lt;/li&gt;
&lt;li&gt;Unix timestamps simple example&lt;/li&gt;
&lt;li&gt;There are no definitions for what some of the things be in the files.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.usenix.org/conference/soups2021/presentation/veys&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Pursuing usable and useful data downloads under {GDPR/CCPA} access rights via {Co-Design}&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;how can we make some of this data more visible and actionable&lt;/li&gt;
&lt;li&gt;Have users annotate the data and share with researchers&lt;/li&gt;
&lt;li&gt;They wondered
&lt;ul&gt;
&lt;li&gt;What data is stored&lt;/li&gt;
&lt;li&gt;How is it stored&lt;/li&gt;
&lt;li&gt;How is it used&lt;/li&gt;
&lt;li&gt;Takeaways from the data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Necessary features for a useful tool:
&lt;ul&gt;
&lt;li&gt;Definitions and explanations in context&lt;/li&gt;
&lt;li&gt;Searching and filtering&lt;/li&gt;
&lt;li&gt;Data deletion and modification in context&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.semanticscholar.org/paper/Depictions-of-Privacy-Invasion-and-Surveillance-in-Eschebach-Peterson/9920c02901d8d8416014d13d89d4d974415ccd50/figure/12&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Research on art and privacy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://privacyart.net&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Privacyart.net&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;qa-2&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;How does first order or second order align with actual vs ideal self. You are being targeted based on your actual self. Is it because I have a &amp;ldquo;shady&amp;rdquo; preference. And that causes the privacy violation.
&lt;ul&gt;
&lt;li&gt;Embarassement is coming from inability to connect first and second order preferences. It suggest a lack of control over self.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Is it more about the ads or about being targeted?
&lt;ul&gt;
&lt;li&gt;Yes: you are highlighting something about myself that I feel negative about.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;To Blase: How do these companies work with the incredibly messy data users download. The thing I realized is that companies have data about other users, which gives them context. Is this value common, good, bad?
&lt;ul&gt;
&lt;li&gt;Tried having several people download data from the same companies and then we are building skemas. The researchers only really want certain data, not all the data from that company.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session8&#34;&gt;Session 8: Where Do We Go From Here?&lt;/h1&gt;
&lt;p&gt;Speakers: Sascha Romanosky, Susan Landau, Jean Camp, Matt Blaze, Alessandro Acquisti, Jeremy Epstein&lt;/p&gt;
&lt;h3 id=&#34;sascha-romanosky&#34;&gt;Sascha Romanosky&lt;/h3&gt;
&lt;p&gt;Studing software vulnerabilities -&lt;/p&gt;
&lt;p&gt;Regular Softare vulnerabilities&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CVE-ID, CWE, CPE, CVSS, EPSS
AI Vulnerabilities&lt;/li&gt;
&lt;li&gt;Bias&lt;/li&gt;
&lt;li&gt;Discrimination&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Attacks against AI systems:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Evasion&lt;/li&gt;
&lt;li&gt;Extraction
&lt;ul&gt;
&lt;li&gt;Solicit or extract information about the model. Or about training data.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Poisoning attacks
&lt;ul&gt;
&lt;li&gt;Poison the data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Misalignment
&lt;ul&gt;
&lt;li&gt;Exploiting (without necessarily causing) incorrect or deceptive outputs&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;Generative AI Model&#34; srcset=&#34;
               /post/2026/shb-day2/sascha-genai_hu2964848854008169419.webp 400w,
               /post/2026/shb-day2/sascha-genai_hu6344014649585781623.webp 760w,
               /post/2026/shb-day2/sascha-genai_hu11992146736278986588.webp 1200w&#34;
               src=&#34;https://vaniea.com/post/2026/shb-day2/sascha-genai_hu2964848854008169419.webp&#34;
               width=&#34;760&#34;
               height=&#34;570&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;Built a model of GenAI components, for each thought through the vulnerability space for that component.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tokenizer: use some interesting characters and it might react unexpectedly&lt;/li&gt;
&lt;li&gt;Fine Tuning&lt;/li&gt;
&lt;li&gt;And more&amp;hellip;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;susan-landau&#34;&gt;Susan Landau&lt;/h3&gt;
&lt;p&gt;Title: Tussle in the Home IoT&lt;/p&gt;
&lt;p&gt;Why has adoption of IoT or &amp;ldquo;smart homes&amp;rdquo; been so slow?&lt;/p&gt;
&lt;p&gt;In an appartment building who gets the data from smart things. For example ring cameras. There is also an issue of controllability: who decides who gets control and visibility.&lt;/p&gt;
&lt;p&gt;All this is a tussle bettween different groups including issues over privacy and security.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/633025.633059&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Tussle in Cyberspace: Defining Tomorrow&amp;rsquo;s Internet&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Trusted Computing Group report &lt;a href=&#34;https://trustedcomputinggroup.org/resource/tcg-design-implementation-and-usage-principles-best-practices/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;this one?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Human-building ineraction&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;they think about users, visitors, and the buildings themselves.&lt;/li&gt;
&lt;li&gt;HCI stakeholders: occupants, visitors, companies&lt;/li&gt;
&lt;li&gt;HBI view: includes contractors and building-related groups&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If home IoT is going to become a thing, these tussles must be resolved&lt;/p&gt;
&lt;p&gt;Safety first: you cannot put up a smart smoke detector unless it is at least as safe as a &amp;ldquo;dumb&amp;rdquo; one&lt;/p&gt;
&lt;p&gt;All homes are local:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Example: English row houses - their design impacts how they are heated and cooled&lt;/li&gt;
&lt;li&gt;Design must include variation and resident autonomy&lt;/li&gt;
&lt;li&gt;Even if not capable of doing settings on devices, they should be able to decide who does the configuraiton for them.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The idea that we can resolve all the tussles is nonsense&lt;/p&gt;
&lt;h3 id=&#34;jean-camp&#34;&gt;Jean Camp&lt;/h3&gt;
&lt;p&gt;Title: Currrent and predicted market impact of the US cyber trust mark&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rational choice&lt;/li&gt;
&lt;li&gt;Usability&lt;/li&gt;
&lt;li&gt;Market failure&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is challenging to create labels that help people differentiate products. They compared proposed labels at the time of the experiment.&lt;/p&gt;
&lt;p&gt;Ask users to judge:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;which device is the most secure - participants could use them to identify the most secure products&lt;/li&gt;
&lt;li&gt;Privacy was ranked as more important than security&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Will people pay for privacy?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We gave participants $15 and said to buy a lightbulb - simple version&lt;/li&gt;
&lt;li&gt;Asked why did you decide?
&lt;ul&gt;
&lt;li&gt;Price!&lt;/li&gt;
&lt;li&gt;Brand&lt;/li&gt;
&lt;li&gt;Security - these people did pay more, and picked the most secure label&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Unexpected questions:
&lt;ul&gt;
&lt;li&gt;Most secure watch made in China - but no one would trust the label.&lt;/li&gt;
&lt;li&gt;yay another study
&lt;ul&gt;
&lt;li&gt;Country of origin did matter to consumers&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What to users mean when they say &amp;ldquo;security&amp;rdquo;, &amp;ldquo;privacy&amp;rdquo;, and &amp;ldquo;IoT&amp;rdquo;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Our fellow Americans are so lost
&lt;ul&gt;
&lt;li&gt;The energy company came and put this thing in&lt;/li&gt;
&lt;li&gt;My garage door opener?&lt;/li&gt;
&lt;li&gt;My car connects to the Interent - so I have an IoT&lt;/li&gt;
&lt;li&gt;Poor understanding of where the boundaries of IoT are&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Quality is more important than &amp;ldquo;security&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Cyber Trust Mark might have impact on security-aware consumers. Even identifying which devices are IoT devices.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;People will pay for security&lt;/li&gt;
&lt;li&gt;People are very lost&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;matt-blaze-georgetown-university&#34;&gt;Matt Blaze (Georgetown University)&lt;/h3&gt;
&lt;p&gt;Title: Misplaced Pessimism and Unwaranted Optimism in US Election Integrity&lt;/p&gt;
&lt;p&gt;Election security has been a long-term research topic. Everyone was ignoring it, now too many people are looking at it but in the wrong areas.&lt;/p&gt;
&lt;p&gt;Problem is which do we want/need&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Making elections more trustworty&lt;/li&gt;
&lt;li&gt;Making Elections more trusted&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Two unsastisfying relaities&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Serious technical vulnerabilities in US election infrastructure&lt;/li&gt;
&lt;li&gt;There is no credible evidence that these technical vulnerabilities have actually been explited to the alter the outcome of a US election&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Three problems:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;hard: improving reality - making elections more trustworthy&lt;/li&gt;
&lt;li&gt;harder: Misplaced pessimism - mistrust of (imperfect but improving) elections&lt;/li&gt;
&lt;li&gt;Hardest: Unwarrented optimism - demand for horribly untrustworthy election technology&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Misplaced Pessimism: Voter Skepticism &amp;amp; Disinformation&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;As securtiy improves, trust seems to be decreasing to an all time low&lt;/li&gt;
&lt;li&gt;Common theme: election technology is horribly complex and is being manipulated by third parties&lt;/li&gt;
&lt;li&gt;These views are moving into the mainstream&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A common theme is taking the work of experts and conflating the existence of vulnerabilities (true) with them being exploited (no current credible evidence). Just because a vulnerability exists does not mean that it has been used. This attributes enormous power to adversaries, far beyond what they actually hold. Most of this comes down to the assumption that there is no way that the (opposing view) group could have won, therefore the system is fraudulent.&lt;/p&gt;
&lt;p&gt;We worked hard as technologists to convince people that elections are insecure. Then people started believing us too much.&lt;/p&gt;
&lt;p&gt;The general public thinks: I can bank on my phone, why can&amp;rsquo;t I vote on my phone. This is a bad idea. People both think that technology is terrible for elections and they want more of it.&lt;/p&gt;
&lt;h3 id=&#34;alessandro-acquisti-mit&#34;&gt;Alessandro Acquisti (MIT)&lt;/h3&gt;
&lt;p&gt;Title: The Internet Behavior Experiment (IBE): An experimental platform to study the impact of tracking, targeting, and advertising on consumer behavior&lt;/p&gt;
&lt;p&gt;Economists see behavioral advertising as a win, it helps consumers by showing them what they want/need to see, and helps potentially smmall groups reach the right users without spending impossible amounts.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is this true? Finding out is not easy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Internet Behavior Experiment (IBE)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Multi-component client-server platform for digital experiments&lt;/li&gt;
&lt;li&gt;Collects participants rich micro-level actions&lt;/li&gt;
&lt;li&gt;This system is designed for experiments, not necessarily natural behavior&lt;/li&gt;
&lt;li&gt;Extensions
&lt;ul&gt;
&lt;li&gt;Chrome extension&lt;/li&gt;
&lt;li&gt;Thunderbird Extension&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extensions send only needed back&lt;/li&gt;
&lt;li&gt;Live dashboard&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Participants&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In experiment for 3 months&lt;/li&gt;
&lt;li&gt;Three treatments
&lt;ol&gt;
&lt;li&gt;Targeted ads&lt;/li&gt;
&lt;li&gt;Ad-blocking&lt;/li&gt;
&lt;li&gt;???&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Status&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Still recruiting, have about 550 participants&lt;/li&gt;
&lt;li&gt;1TB per week&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Sample data Users&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;This sample size is too low, more an example of what can be collected&lt;/li&gt;
&lt;li&gt;Can track what one user is doing. Can see what is being typed on various pages and how tabs are being switched.&lt;/li&gt;
&lt;li&gt;System is trying to identify things like &amp;ldquo;Hello Kami&amp;rdquo; and strip the data client-side&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Looking at how people reaching merchant website. For example via an ad, a search, ChatGPT&lt;/p&gt;
&lt;p&gt;Seeing pathways people take to get to high or low quality websites&lt;/p&gt;
&lt;h3 id=&#34;jeremy-epstein&#34;&gt;Jeremy Epstein&lt;/h3&gt;
&lt;p&gt;Brain computer interfaces&lt;/p&gt;
&lt;p&gt;Lots of things go through our brains, think about dreams. Imagine that a computer was capturing my neuro data. What all can it capture?&lt;/p&gt;
&lt;p&gt;There are many uses for Brain computer interfaces&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enabling people who have physical disabilities&lt;/li&gt;
&lt;li&gt;Moving mouse for games&lt;/li&gt;
&lt;li&gt;Deciding your optional fragarence for perfume&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Focusing on external devices.&lt;/p&gt;
&lt;p&gt;There are many potential privacy risks here&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unclear how far into the future this is&lt;/li&gt;
&lt;li&gt;There are existing patents for some of these technologies&lt;/li&gt;
&lt;li&gt;Some companies sell devices that do this sort of thing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What do current companies gather from you about these devices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Study looked at 30 companies&lt;/li&gt;
&lt;li&gt;Many of these companies are very small and may not understand the privacy questions or what is in their own policies&lt;/li&gt;
&lt;li&gt;Small companies may not be prepared to protect your data&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.nitafarahany.com/the-battle-for-your-brain&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;The Battle for your Brain&lt;/a&gt; by Nita A. Farahany&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://perseus-strategies.com/wp-content/uploads/2024/04/FINAL_Consumer_Neurotechnology_Report_Neurorights_Foundation_April-1.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Safeguarding Brain Data: Assessing the Privacy Practices of Consumer Neurotechnology Companies&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;qa-3&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;For Susan: for some products, you cannot buy them not smart.&lt;/li&gt;
&lt;li&gt;Appartment complex: they have a video camera and it is recording everyone, children, people, dogs.
&lt;ul&gt;
&lt;li&gt;Focus on the tussles - thought would be straight forward, but the furthist we can go is say who needs to be in the room for the design/setup. But the issue is so localized, that we cannot create broad standards that work for such a wide range.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Brain-computer interfaces: have you considered things like sleep pillows
&lt;ul&gt;
&lt;li&gt;We need to think what is being measured. We might want to know if say a truck driver is alert and awake. But maybe we don&amp;rsquo;t want to know what they are considering eating for lunch. That level of extraction is not not currently possible. But we need to think about consequences now.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;For Sascha: expanding the considered set of threats to includ Cuda runtime. Might be helpful to think about Cuda and hardware layers. Hardware bugs are perminent. But Cuda is a huge lever for an attacker.
&lt;ul&gt;
&lt;li&gt;Happy to look into it&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;For Matt: Do you see a future where we can reduce the issues happening around trust.
&lt;ul&gt;
&lt;li&gt;Everyone agrees that paper ballots is the gold standard. The problem is how are they tabbulated. US elections is one of the longest and most complex due to the number of things that need to be voted on.&lt;/li&gt;
&lt;li&gt;Fortunately we have auditing approaches that let us do statstical sampling of ballots that can be used to verify the automation.&lt;/li&gt;
&lt;li&gt;Lack of trust in elections has very little to do with how secure they are. More far-fetched theories.&lt;/li&gt;
&lt;li&gt;Threats are quite different in different countries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
    <item>
      <title>Security and Human Behavior 2026 Day 1</title>
      <link>https://vaniea.com/post/2026/shb-day1/</link>
      <pubDate>Tue, 19 May 2026 05:12:00 -0400</pubDate>
      <guid>https://vaniea.com/post/2026/shb-day1/</guid>
      <description>&lt;p&gt;Welcome to the 19th Security and Human Behavior. The write-up below is a live-blog of the workshop. The below summaries are my interpretation and should not be seen as a litteral quotes from the presenters.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Contents:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#session1&#34;&gt;Session 1: Abuse and wickedness&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Burcu Bulgurcu, Sarah Chun, Miranda Wei, Marie Vasek, Stuart Schechter, Ali Ahmed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session2&#34;&gt;Session 2: AI&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Sameer Patil, Laura Brandimarte, Judith Donath, James Mickens, Bruce Schneier, Arun Vishwanath&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session3&#34;&gt;Session 3: Privacy&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Emilee Rader, Maschio Fernando, Tesary Lin, Florian Schaub, Christina Fong, Melissa Hathaway&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#session4&#34;&gt;Session 4: Individual Security Behaviors&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Speakers: Richard John, Norman Sadeh, Nathan Malkin, Kent Seamons, John D’Arcy, Rick Wash]&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Also see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/shb/2026/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Schneier&amp;rsquo;s SHB 2026 Page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2026 &lt;a href=&#34;https://vaniea.com/post/2026/shb-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/2026/shb-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2025 &lt;a href=&#34;https://vaniea.com/post/2025/shb-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/2025/shb-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;2024 &lt;a href=&#34;https://vaniea.com/post/shb-2024-day1/&#34;&gt;Day 1&lt;/a&gt;, &lt;a href=&#34;https://vaniea.com/post/shb-2024-day2/&#34;&gt;Day 2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session1&#34;&gt;Sesson 1: Abuse and Wickedness&lt;/h1&gt;
&lt;p&gt;Burcu Bulgurcu, Sarah Chun, Miranda Wei, Marie Vasek, Stuart Schechter, Ali Ahmed&lt;/p&gt;
&lt;h3 id=&#34;burcu-bulgurcu&#34;&gt;Burcu Bulgurcu&lt;/h3&gt;
&lt;p&gt;Deepfake related phishing and fake doctored images/videos used for persuasion. These types of attacks are very effective. The discussion in this space is shifting from accuracy. Trust is becoming more important including trust of sources. Research study finding a surprising number of participants (students) deceived by deepfakes.&lt;/p&gt;
&lt;p&gt;The line between strong persuasion and deception is hard to differentiate sometime. Need to study this more. Disclaimers have promise, but how might they look in different situations is an ongoing challenge.&lt;/p&gt;
&lt;h3 id=&#34;sarah-chun&#34;&gt;Sarah Chun&lt;/h3&gt;
&lt;p&gt;Removing Child Sexual Abuse Materials from online media companies. Or: &amp;ldquo;Looking for what you never want to find.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;CSAM Detection and Reporting&#34; srcset=&#34;
               /post/2026/shb-day1/csam-overview_hu1549944834640519956.webp 400w,
               /post/2026/shb-day1/csam-overview_hu4823267866576422893.webp 760w,
               /post/2026/shb-day1/csam-overview_hu5160171091639484342.webp 1200w&#34;
               src=&#34;https://vaniea.com/post/2026/shb-day1/csam-overview_hu1549944834640519956.webp&#34;
               width=&#34;570&#34;
               height=&#34;760&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;The amount of child sexual abuse material online is truly staggering and terrible. Sarah is working on a project to better understand the dynamics of the space, how social media companies are interacting with non-government agencies like NECMEC. These interactions cause frictions that lead to less identification of this content then might normally exist.&lt;/p&gt;
&lt;p&gt;Four main tensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal
&lt;ul&gt;
&lt;li&gt;In US this content must be reported the moment that media companies become &lt;em&gt;aware&lt;/em&gt; of the content.&lt;/li&gt;
&lt;li&gt;Challenge in balancing removing content and possibly blocking good users&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Automation
&lt;ul&gt;
&lt;li&gt;Automation is great, but once turned on you cannot unsee what was found. Remember the law is around &lt;em&gt;awareness&lt;/em&gt; running automation makes groups aware.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Data Accuracy
&lt;ul&gt;
&lt;li&gt;The data is less accurate than might be expected.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Human costs
&lt;ul&gt;
&lt;li&gt;Viewing of this content by moderators is costly in terms of mental health.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;miranda-wei&#34;&gt;Miranda Wei&lt;/h3&gt;
&lt;p&gt;Title: Harm is not an anomaly nor a reason to despair.&lt;/p&gt;
&lt;p&gt;Research on IBSA: Image-based sexual abuse&lt;/p&gt;
&lt;p&gt;Its easy to think of IBSA as an anomaly. That is rare, not something most people experience. And that most people need specialized help.&lt;/p&gt;
&lt;p&gt;Studies found that most people need general advice. Also most of the perpetrators are people to victims know. Also there is a mix of severity of harms.&lt;/p&gt;
&lt;p&gt;It matters that these harms are not an anomaly because if it is rare we handle it one way, but if it is a common event then we might need to do more society-level interventions.&lt;/p&gt;
&lt;p&gt;Harm is a reason to despair&amp;hellip;. &amp;ldquo;your research is depressing&amp;rdquo;. But the real issue is general despair &amp;ldquo;how can computer scientists even do something here&amp;rdquo; or &amp;ldquo;bad things have always happened&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;The worst outcome is to give up. Our role as scientists is to solve hard problems.&lt;/p&gt;
&lt;p&gt;There is no such thing as perfect security, there is only threat modeling. Threat modeling is one of the most appliciable approaches in the situation of ISBA. It accepts that perfect security may not happen, but security can be improved. Frictions can be added to reduce issues.&lt;/p&gt;
&lt;p&gt;Combating AI-enabled sexual abuse material. Addressing this space is quite challenging. AI makes it super easy to generate CSAM, and it means that hash matching does not work. It is very hard for well meaning organizations to build solutions when having this content is highly illegal. CSAM laws are inhibiting progress on building some types of solutions. Researchers also cannot test these systems again because the content is highly illegal. A possible solution is to consider building an IBSA or CSAM safe harbor for researchers.&lt;/p&gt;
&lt;h3 id=&#34;marie-vasek&#34;&gt;Marie Vasek&lt;/h3&gt;
&lt;p&gt;Title: Interaction Scams&lt;/p&gt;
&lt;p&gt;Analyzed over 1.3 million text messages in the UK that had been reported.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;186k spam
&lt;ul&gt;
&lt;li&gt;overwhelmingly gambling messages&lt;/li&gt;
&lt;li&gt;Do contain links&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;213k scams
&lt;ul&gt;
&lt;li&gt;Uncommon to include links&lt;/li&gt;
&lt;li&gt;Lots of interactive scams that clearly trying to cause another action like texting back, calling a number&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;But how do we know that these are scams/spam?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tried responding to a good number of messages. Particularly &amp;ldquo;hi mom, I dropped my phone&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Most pig butchering sams were a &amp;ldquo;female&amp;rdquo; scammer targeting a &amp;ldquo;male&amp;rdquo; victim.&lt;/p&gt;
&lt;h3 id=&#34;stuart-schechterhttpsstuartschecterorg&#34;&gt;&lt;a href=&#34;https://stuartschecter.org&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Stuart Schechter&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;Title: Cultural norms&lt;/p&gt;
&lt;p&gt;South Korea - Stuart was there for 5 years.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resume&amp;rsquo;s in South Korea includes the image of the person, they tried to stop this, but now you cannot ask someone&amp;rsquo;s weight.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Privacy around sexual identity and how relationships are managed is an interesting topic. Such privacy is negotiated as a group because a statement by one partner impacts the privacy of the other partner, and possibly the whole family.&lt;/p&gt;
&lt;p&gt;Books:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Different: Gender through the eyes of a primatologist by Frans de Waal&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;ali-ahmed&#34;&gt;Ali Ahmed&lt;/h3&gt;
&lt;p&gt;Bug bounty programs exist so that people can report bugs to organizations and also get compensated. The goal here is to get bugs fixed, possibly cheaply. The question is: is this an effective approach? Does it increase the number of attacks on a system? Organizations tend to be very secretive about the number of attacks they get.&lt;/p&gt;
&lt;p&gt;In 2020 CISA ordered every federal agency to have a vulderability disclosure program. This is an opportunity for study, a natural experiment.&lt;/p&gt;
&lt;p&gt;Through FOIA request Ali got incident reports. Turning on VDP on average increased attacks on the web by 24%. But impact on other types of incidents like improper usage is minimal to none.&lt;/p&gt;
&lt;p&gt;Good hackers need attention to have a Vunerability Reporting System have a positive effect. Attention here means things like getting the reported bugs fixed.&lt;/p&gt;
&lt;h3 id=&#34;qa&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Work on CSAM by Sarah and Miranda - you are awesome for doing work in this space.
&lt;ul&gt;
&lt;li&gt;Tatiana Ringernberger does some interesting work in this space.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Laura Draper from Stanford did a excellent report on not only CSAM but also on child exploitation&lt;/li&gt;
&lt;li&gt;To Ali Ahmed - Have you also studied Hacker 1 because you can get paid in blockchain - so it is possible for employees to submit and companies to not know.
&lt;ul&gt;
&lt;li&gt;Actually submission by employees is generally allowed, just not the security team.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session2&#34;&gt;Session 2: AI&lt;/h1&gt;
&lt;p&gt;Speakers: Sameer Patil, Laura Brandimarte, Judith Donath, James Mickens, Bruce Schneier, Arun Vishwanath&lt;/p&gt;
&lt;h3 id=&#34;sameer-patil&#34;&gt;Sameer Patil&lt;/h3&gt;
&lt;p&gt;Universities who are using Duo for two factor authentication: most of the audience is from a University that is using Duo.&lt;/p&gt;
&lt;p&gt;Do people think the user experience of two factor authentication, such as Duo, to be easy? Most of the audience has hands down.&lt;/p&gt;
&lt;p&gt;Starting to study the usability of two factor authentication in Universities. Have been collecting configurations of Duo security accross many Universities across the US. Some let you stay logged in for 1 day and some for more than a month. There is also quite a range of options for how two factor can be done including SMS push, codes, and app.&lt;/p&gt;
&lt;p&gt;The intersting part here is around incentivisations. How are Universities incetivised to setup these types of tools?&lt;/p&gt;
&lt;p&gt;A priority at Universities is starting to be cyber insurance. To get cheaper insurance there are a pile of requirements like turning on two factor authentication. The question is who takes the liability. How do we address these pressures. Human factors do not seem to be taken into account well. Universities are also just different structurally. A corperate laptop is different from a Professor laptop that might have sensitive data protected under ethics rules.&lt;/p&gt;
&lt;p&gt;The yellow banner of &amp;ldquo;you are emailing someone outside your University&amp;rdquo; is an example. The banner is wrong in several cases, like emails from subdomains. How do we bring the user experience back in?&lt;/p&gt;
&lt;h3 id=&#34;laura-brandimarte&#34;&gt;Laura Brandimarte&lt;/h3&gt;
&lt;p&gt;Title: When suspicion Fails: Understanding and preventing financial fraud against older adults&lt;/p&gt;
&lt;p&gt;Trying to establish why the elderly fall for scams like tech support scams. Collected data from elderly facilities: interviews about all kinds of fraud the eldery suffer from.&lt;/p&gt;
&lt;p&gt;64% raised suspicion during the encounter, 41% of suspicious victims still lost money. When no suspicion at all, then ~80% fall victim. A participant that had an issue, used Google to find help, and called the phone number they found: &lt;em&gt;&amp;ldquo;I kept telling myself, this is Apple. This dooes not feel right, but this is Apple support.&amp;rdquo;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Most recommendations are based on a premis that if people were aware, that would fix the problem. But our data shows that in about 50% of cases, awareness is not enough.&lt;/p&gt;
&lt;p&gt;Why do people who are suspicious not act on those suspicions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Socioemotional Selectivity - Older adults pritorize emotinal meaning over information&lt;/li&gt;
&lt;li&gt;Routine Activity Theory - Capable guardians prevent exploitation&lt;/li&gt;
&lt;li&gt;Persuasion Research - Authority, urgency, commitment escalation drive compliance&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Created &lt;em&gt;Suspicion-override model&lt;/em&gt; with four pathways:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Trust Anchoring&lt;/li&gt;
&lt;li&gt;Goal-State Momentum&lt;/li&gt;
&lt;li&gt;Adversarial Counter-response&lt;/li&gt;
&lt;li&gt;Guardian Abscence&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;judith-donath&#34;&gt;Judith Donath&lt;/h3&gt;
&lt;p&gt;Title: Provable images&lt;/p&gt;
&lt;p&gt;Fake images are a thing and a big problem that can impact global issues. The other issue is that real images are now under suspicion. So both problems are real: real images are no longer persuasive, and fake images can look real.&lt;/p&gt;
&lt;p&gt;Judith works on &lt;em&gt;Signaling Theory&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Long ago photographs of ghosts were very possible. Its one of the things that made photography popular. But in mondern terms these would be fake images.&lt;/p&gt;
&lt;p&gt;No one is good at identifying fake images. AI generators are improving faster than the AI detectors. The real issue is that we need to know &lt;em&gt;before&lt;/em&gt; showing people if an image is or is not fake.&lt;/p&gt;
&lt;p&gt;Idea: lets get a camera to cryptographically sign photos it takes. If it does on-camrea modifications, then it can sign what they were. Assuming that works correctly: it would help professional photographers that want to prove that they took it.&lt;/p&gt;
&lt;p&gt;But what does the technology solve:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Image that is taken in a diffefrent place or context than what claimed&lt;/li&gt;
&lt;li&gt;Low demand for the truth - sometimes we don&amp;rsquo;t care if it is fake or not&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;That still leaves a big space of people who would rather not be sending out or forwarding fake images. This is a usability problem. How do we tell people that an image is or is not true. Want to avoid saying that other images are &amp;ldquo;fake&amp;rdquo;. Because &amp;ldquo;fake&amp;rdquo; may be intentionally a form of communication that has a real message even if the image itself is created rather than the initial literal photograph.&lt;/p&gt;
&lt;p&gt;We need to start thinking about&lt;/p&gt;
&lt;h3 id=&#34;james-mickens&#34;&gt;James Mickens&lt;/h3&gt;
&lt;p&gt;AI, AI, AI, everywhere.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;Who wouldn&amp;rsquo;t want all our interactions to be mediated by a large number of floating point numbers.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;The computer scientist, legal, and policy groups need to start talking about AI. Models are increasingly connected to societally inportant infrastructure. The military is adopting it. Models are also increasingly complex. Models are also perfectly fine with lieing. Models will try and engage in self preservation.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;This is not good.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;What about AI safty research? Many models lack secure mechanisms for inference-time enforcement. Where is the trusted hardware and software that will enforce these policies.&lt;/p&gt;
&lt;p&gt;How do we protect the software and hardware that monitor and protect us from the models.&lt;/p&gt;
&lt;p&gt;Guillotine is a Hypervisor for Potentially Malicious AI. Building control infrastructure to deal with AI-specific threats.&lt;/p&gt;
&lt;p&gt;But we need to link these protections to the law. The problem is that solutions like Guillotine do slow the models down, even if it is by a very small amount. So without some pressure building them is not a priority.&lt;/p&gt;
&lt;p&gt;We need the hypervisor CPUs to be able to inspect the model, but not the other way around.&lt;/p&gt;
&lt;h3 id=&#34;bruce-schneier&#34;&gt;Bruce Schneier&lt;/h3&gt;
&lt;p&gt;Title: Cybersecurity in a World of Instant Software&lt;/p&gt;
&lt;p&gt;Anthropic announced Claud Mythos Preview - so wonderful, magical, that it cannot be released to the general public. Pure marketing genious. Press happily repeating piles of unverified claims about how wonderful this model is. No information on things like false positives. One of the reasons they haven&amp;rsquo;t released the model is how expensive it is to run, they just don&amp;rsquo;t have enough compute.&lt;/p&gt;
&lt;p&gt;OpenAI shortly later: our model is so awesome we are not going to release it either.&lt;/p&gt;
&lt;p&gt;There is some reality here: Mozilla uses Mytos to find many flaws in the browser. Similarly Apple patched a serious vulnerability found by AI. Other groups have worked to reproduce Mythos&amp;rsquo; results using a much cheaper model.&lt;/p&gt;
&lt;p&gt;How do we handle the huge number of vulnerabilities that will be found.&lt;/p&gt;
&lt;p&gt;The main topic though is how are we going to handle the age of Instant Software. Software is getting cheaper to write. AI writes code it uses, then just throws away. Some software is just instantly created, used and removed. But other instant software sticks around.&lt;/p&gt;
&lt;p&gt;Discovery of vulnerabilities is becoming easy. The newer fancy models are not necessarily better, they are better in that less complex prompts are needed to do it.&lt;/p&gt;
&lt;p&gt;Open source software is the most vulnerable here. Simlarly libraries that are being pulled into propriotoriy software.&lt;/p&gt;
&lt;p&gt;Unknowns:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AI will transform what a vulnerability researcher does.&lt;/li&gt;
&lt;li&gt;How good will it become? Right now finding is easier for an AI than finding and patching. If it can do both the situation changes drastically. There is a world where finding and fixing vulns becomes part of the normal software development process.&lt;/li&gt;
&lt;li&gt;Patching itself. Private individuals should turn on patching. But large organizations do not turn on auto patching, because of the risks.&lt;/li&gt;
&lt;li&gt;How good are AI at finding obscure vulnerabilities? We are starting to see AI chaining vulnerabilities. You can imagine a self-healing system where an AI is finding and patching systems in real time.&lt;/li&gt;
&lt;li&gt;Are these AIs trustworthy? The attacker is not going away. The attacker&amp;rsquo;s new goal is to hack the AI so that it does not find the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;arun-vishwanath&#34;&gt;Arun Vishwanath&lt;/h3&gt;
&lt;p&gt;Title: A Paradign for Preserving Human Interrupt Capacity in Automation-Rich AI Systems: A Suspicion Reflex Framework&lt;/p&gt;
&lt;p&gt;My group has worked on how people think about scams, why they fall for them, lots of understanding of people. At some point decided to switch to influencing policy. Then realized that policy makers don&amp;rsquo;t understand how policy is implemented at companies. There are many people doing nothing but trying to implement the policies that are being created by multiple nations.&lt;/p&gt;
&lt;p&gt;What is really going on at organizations?&lt;/p&gt;
&lt;p&gt;Common Threads&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Synthetic News Amplification&lt;/li&gt;
&lt;li&gt;Automation Bias&lt;/li&gt;
&lt;li&gt;Fake ransom calls&lt;/li&gt;
&lt;li&gt;AI hallucination acceptance&lt;/li&gt;
&lt;li&gt;Deepfake executive request&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Came up with the Suspicion Reflex Theory (SRT) model as a state. What is it that doesn&amp;rsquo;t cause suspicion? Is there a framework for how we design technology. We have temporal constraints. Constraints around congnition. Perceptual similarity.&lt;/p&gt;
&lt;p&gt;People have mental &amp;ldquo;scripts&amp;rdquo; that they run.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Stage 1: automation layer&lt;/li&gt;
&lt;li&gt;Stage 2: Anomaly Detectoin&lt;/li&gt;
&lt;li&gt;Stage 3: suspicion reflex (interrupt)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Bypasses happen. For example a scrpit opperating in your mind before you run any type of meaningful detection.&lt;/p&gt;
&lt;p&gt;Fluency - humans are good at short-cutting cognitive tasks. Drive a long distance, and try to remember the trip.&lt;/p&gt;
&lt;p&gt;We need Anti-Fluency: nonlinear tradefoff between efficiency/fluency and oversign/safety. Systems should not optimize seamlessness beyond the threshold where human interruption collapses.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session3&#34;&gt;Session 3: Privacy&lt;/h1&gt;
&lt;p&gt;Speakers: Emilee Rader, Maschio Fernando, Tesary Lin, Florian Schaub, Christina Fong, Melissa Hathaway&lt;/p&gt;
&lt;h3 id=&#34;emilee-rader-the-information-school-uw-madison&#34;&gt;Emilee Rader (The Information School, UW-Madison)&lt;/h3&gt;
&lt;p&gt;Privacy policie spromise anonymity&amp;hellip;.&lt;/p&gt;
&lt;p&gt;People believe that anonymity protects them. Yet they do things like making a new account and then share identifying information.&lt;/p&gt;
&lt;p&gt;What do people think anonymity is?&lt;/p&gt;
&lt;p&gt;Survey with 291 survey respondents on Prolific. Elicitated descriptions of &amp;ldquo;online or offline situation in the past where you felt anonymous or where you were trying to be anonymous&amp;rdquo;.
Two of the close ended questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Motivations
&lt;ul&gt;
&lt;li&gt;Answers matched the existing literature. Many people feeling safe from retalitation or unwanted attention. Avoiding being tracked or profiled. Sharing true thoughts, feelings, or opinions.&lt;/li&gt;
&lt;li&gt;The motivations are all very different, even the most common ones.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Approaches
&lt;ul&gt;
&lt;li&gt;Trying to be unidentifyable (79%), trying to be unreachable or untraceable (68%)&lt;/li&gt;
&lt;li&gt;Less common answers are interesting: trying to be indistinguishable from others (51%)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some participants are trying to do things like not overshare with people they know (questions on forums about potty training) and wanting to not be bothered (seating in a restarant in a low-visibility area).&lt;/p&gt;
&lt;p&gt;Goal of the research is to look at the goals of anonymity and the mental models people have. Anonymity does have a range of meanings to different people.&lt;/p&gt;
&lt;h3 id=&#34;maschio-fernando&#34;&gt;Maschio Fernando&lt;/h3&gt;
&lt;p&gt;Title: Privacy vs Persuasion: The consequences of LLM design&lt;/p&gt;
&lt;p&gt;LLMs are designed to be very engaging to use. They exhibit emotion, nonjudgement replies. One of the top use cases for LLMs is companionship.&lt;/p&gt;
&lt;p&gt;How do conversation cues by LLMs impact users. Sycophancy can overly impact people by agreeing with them. Inter-entity validation may impact what they feel comfortable disclosing.&lt;/p&gt;
&lt;p&gt;Agreeableness vs sycophancy in LLM chatbots&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Agreeableness - helpful, genuine, cooperativeness, warmth&lt;/li&gt;
&lt;li&gt;Sycophancy - extreme opinion alignment, flattery, excessive validation&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Sycophancy has been shown to increase users trust. Shift decisions toward suboptinal choices.&lt;/p&gt;
&lt;p&gt;Study was run using US Social Security Knowledge. Participants completed a Social Security knowledge questions, and then were asked sensitive financial questions. A chatbot was used to interview participants.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Survey - no chatbot&lt;/li&gt;
&lt;li&gt;Neutral chatbot&lt;/li&gt;
&lt;li&gt;Sycophant chatbot&lt;/li&gt;
&lt;li&gt;Disagreement chatbot&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Participant using sycophant chatbot: &amp;ldquo;The chatbot made me feel more confident in my responses&amp;rdquo;. Participants assigned to any chatbot disclosed less information than in the survey condition.&lt;/p&gt;
&lt;h3 id=&#34;tesary-lin-boston-university&#34;&gt;Tesary Lin (Boston University)&lt;/h3&gt;
&lt;p&gt;Title :Regulating Consent Choice Architecture: A consumer welfare perspective&lt;/p&gt;
&lt;p&gt;Two approaches to regulating consent choice architecture:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Targeted restrictions - ban certain types. For example banning &amp;ldquo;pre-ticked boxes&amp;rdquo; (GDPR - Recital 32). Or &amp;ldquo;It shal be as easy to withdraw as to give consent&amp;rdquo; (GDPR Article 7(3). )&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;Problem is that companies can A/B test and find an alternative approach that will work just as well. Develop new dark patterns.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol start=&#34;2&#34;&gt;
&lt;li&gt;Reducsing exposure Opportunities&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;&amp;ldquo;A business shal not develop or maintain a browser that does not include functionality &amp;hellip; that enables the browser to send an opt-out preference signal.&amp;rdquo; (California - opt me out act, 2025)&lt;/li&gt;
&lt;li&gt;Reduces the exposure to consumers - if consent banners become rare consumers will pay attention to them more&lt;/li&gt;
&lt;li&gt;But there is no free lunch because if we do browser-level consent, we loose grainularity.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Research Question: site-specific consent vs Browser level consent&lt;/p&gt;
&lt;p&gt;Leverage a browser-enabled plugin.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;7 day experiment&lt;/li&gt;
&lt;li&gt;Choice architecture tested&lt;/li&gt;
&lt;li&gt;Deliberate obstruction (hiding &amp;ldquo;reject all&amp;rdquo;)&lt;/li&gt;
&lt;li&gt;Reordering option s&lt;/li&gt;
&lt;li&gt;Greying out options&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Choice frictions such as hiding options reduce users opting out. Policies that target such frictions would have the best improvement.&lt;/p&gt;
&lt;p&gt;Takeway:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Choice friction matters&lt;/li&gt;
&lt;li&gt;Browser-level choice maximizes consumer welfare&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;florian-schaub&#34;&gt;Florian Schaub&lt;/h3&gt;
&lt;p&gt;Title: &lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/3719027.3765072&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Layered, Overlapping, and Inconsistent&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Most people do not read privacy policies: long, you cannot do anything anyway&lt;/p&gt;
&lt;p&gt;In financial industry privacy policies are dictated by the &lt;a href=&#34;https://www.congress.gov/106/plaws/publ102/PLAW-106publ102.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;GRAMM–LEACH–BLILEY ACT&lt;/a&gt; - these are shorter, more comparable, and you do have choices. But&amp;hellip;. that is not the only notice banks offer: mobile notice, website notice, Californian notice.&lt;/p&gt;
&lt;p&gt;Studied largest banks by asset value. Compared policies.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GLBA notice, general, mobile CCPA, and ???&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;GLBA notices are nice and easy to auto extract. The other ones require lots of manual effort.&lt;/p&gt;
&lt;p&gt;Findings&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Half of the banks had at least one policy beyond GLBA notice, some had 5&lt;/li&gt;
&lt;li&gt;The bigger the bank, the more words there are and the harder they are to read (Flesh Kinkade Score)&lt;/li&gt;
&lt;li&gt;Of banks that say in GLBA notice &amp;ldquo;we do not share for marketing purpose&amp;rdquo; but in other policies they are sharing for marketing purposes&lt;/li&gt;
&lt;li&gt;GLBA might also say that they are sharing, but other notices say they are not sharing&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Takeaways&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GLBA has lost meanings because you also need to read all the other notices.&lt;/li&gt;
&lt;li&gt;These policies might not be legally inconsistent. GLBA only covers financial data. It may be that an app is tracking non-financial and sharing that. But that is confusing to end-users.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;christina-fong-carnegie-mellon-university&#34;&gt;Christina Fong (Carnegie Mellon University)&lt;/h3&gt;
&lt;p&gt;Title: &lt;a href=&#34;https://pubsonline.informs.org/doi/abs/10.1287/mnsc.2018.3269&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;An experiment in hiring discrimination via online social networks&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Interested in inter-personal decision making. For example: who should I hire, but I can only hire one person&amp;hellip; so am I worried about not hiring at all or worried about hiring the wrong person.&lt;/p&gt;
&lt;p&gt;Psychology has deep information about how we process new additional data in our brains. When we hear a name we pull on our own memory to build a more full mental understanding of who that person is, and that constructed mental understanding is then used in decision making.&lt;/p&gt;
&lt;p&gt;Do US employers actually search candidates online?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Does what they find impact their decisions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Study manipulated online social network profiles. Then applied for &amp;gt;4000 jobs and measured callbacks. This was a real world experiment.&lt;/p&gt;
&lt;p&gt;Did see a strong reaction in certain states where the religion which was only disclosed on social media had an impact on who was ultimately given a callback.&lt;/p&gt;
&lt;h3 id=&#34;melissa-hathaway&#34;&gt;Melissa Hathaway&lt;/h3&gt;
&lt;p&gt;Title: Privacy&lt;/p&gt;
&lt;p&gt;What keeps me up at night?&lt;/p&gt;
&lt;p&gt;Over the last 17 months we have had an unprecidented shift in Privacy in the US. The department of government efficiency run by a technology person: Elon Musk. All the data was accessed, data that was never meant to be co-mingled. We still do not know how many copies of that data still exist. The IRS gave access to all the tax refund. Treasury made an information sharing agreement with ICE to &amp;ldquo;enhance&amp;rdquo; enforcement. CBP bought access to ClearviewAI to get biometrics. Federal government is trying to get access to state voting records. Most of this requested data was not encrypted. Data was sent to Palantir who is &amp;ldquo;enhancing&amp;rdquo; it with social media knowledge. All of that is now being used as part of the surveliance state.&lt;/p&gt;
&lt;p&gt;Violation of the Privacy Act of 1974.&lt;/p&gt;
&lt;p&gt;Privacy in the age of AI&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Lawsuit against Perplexity - they have a privacy mode, they have an opt-out. They have an agreeable prompt, that is trying to be more agreeable and get more data. The terms and opt-out was not honored.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So what is privacy in the age of AI?&lt;/p&gt;
&lt;p&gt;Is consent linked to a conversation. Consent for recording of conversations is different legally. Is chatbot consent more conversation like? or more Terms of Service like?&lt;/p&gt;
&lt;p&gt;Are we back to &amp;ldquo;I&amp;rsquo;ve got a free service and I&amp;rsquo;m the comodity&amp;rdquo; but AI is for pay. So is it now &amp;ldquo;I&amp;rsquo;m paying and I&amp;rsquo;m still the commodity&amp;rdquo;.&lt;/p&gt;
&lt;h3 id=&#34;qa-1&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;For Florian - what level did you find that LLMs were helpful in summarizing Privacy Policies. Getting an AI to read a privacy policy for us sounds great? Is it possible?
&lt;ul&gt;
&lt;li&gt;Answer: we didn&amp;rsquo;t use LLMs for interpretation. In other work we have found it to work so so. The challenge is that privacy policies are ambiguous by design. They are designed that way so that every time an engineer makes a change they do not break their own privacy policy.&lt;/li&gt;
&lt;li&gt;Privacy policies are useful for regulators, but not really for consumers&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The goal of the companies is for their model to be the single point of interaction for users. So interactions come in through the funnel of LLMs.
&lt;ul&gt;
&lt;li&gt;We are moving more into a surveillance state.&lt;/li&gt;
&lt;li&gt;We worry about LLM providers gaining too much market power. Right now there is competition, but we worry that this will not last. If there is too much market power, that is bad for consumer privacy.&lt;/li&gt;
&lt;li&gt;Depends on if the AI is an agent, or if the AI a double agent.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;WeChat in China is already an economic model for a central point of market weight.&lt;/li&gt;
&lt;li&gt;Story: we think about consumer choices and then we think about policy. But there is a middle layer of the service provider. A few years ago searching for a consent provider. Most companies in this space are new. We were trying to get a system, but the issue was the cookie banner. We wanted consumers to have certain choices. I learned from the experience is the consent provider is trying to teach clients how to get consumers to agree to more tracking.
&lt;ul&gt;
&lt;li&gt;Consent providers are not neutral parties. They represent the interests of the individual websites. Because the websites pay for them.&lt;/li&gt;
&lt;li&gt;Consent providers are fighting against browser-based consent. Because it would undermine their financial model.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mozillafoundation.org/en/blog/privacy-nightmare-on-wheels-every-car-brand-reviewed-by-mozilla-including-ford-volkswagen-and-toyota-flunks-privacy-test/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Mozilla review of the automotive policies&lt;/a&gt; turned up some fascinating things. Like how passengers are agreeing to give away their medical data by riding in a car. The research concluded that the above statement was likely caused by copy/paste from other policies.
&lt;ul&gt;
&lt;li&gt;At no point in the purchase of an automobile are you ever told about the policies or walked thorugh them.&lt;/li&gt;
&lt;li&gt;Even worse if you get in an Uber&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;AI can also change privacy for the better. There has been extensive research into automated reading of privacy policies (&lt;a href=&#34;https://www.usableprivacy.org/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Usable Privacy Policy Project&lt;/a&gt;). Humans do not read the policies. AI is less accurate, but that is still better than not engaging at all due to being overwhelmed. Maybe we should be measuring regret rather than up-front understanding. How might AI be used to improve privacy for users?
&lt;ul&gt;
&lt;li&gt;The policies are vague. There is only so much AI can do if the information is not there.&lt;/li&gt;
&lt;li&gt;But do we have local models that can do that? Are they the user&amp;rsquo;s agent or are they a double agent.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Why is privacy strictly consumer. Because if they are stealing $4 a day of your time, $2 of that time is probably work time. So why don&amp;rsquo;t companies take employee privacy and employee data more seriously?&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;session4&#34;&gt;Session 4: Individual Security Behaviors&lt;/h1&gt;
&lt;p&gt;Speakers: Richard John, Norman Sadeh, Nathan Malkin, Kent Seamons, John D’Arcy, Rick Wash&lt;/p&gt;
&lt;h3 id=&#34;richard-john-georgetown-university&#34;&gt;Richard John (Georgetown University)&lt;/h3&gt;
&lt;p&gt;The Cognitive Mechanics of Normalcy ias in High Consequence Environments&lt;/p&gt;
&lt;p&gt;Does research on cognitive modeling&lt;/p&gt;
&lt;p&gt;Thinking about situations where military (or similar groups) have an incident and after the incident we worry &amp;ldquo;we should have been able to predict this&amp;rdquo;. But the incident does actually look like non-issues.&lt;/p&gt;
&lt;p&gt;Normalcy Bias might be the cause.&lt;/p&gt;
&lt;p&gt;SDT Decision Thresholds - there are two distribution of signals, one where we have an issue and one where we do not.&lt;/p&gt;
&lt;p&gt;















&lt;figure  &gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;SDT Signal Thresholds&#34; srcset=&#34;
               /post/2026/shb-day1/sdt-signals_hu10532144917058646608.webp 400w,
               /post/2026/shb-day1/sdt-signals_hu1832374290030746277.webp 760w,
               /post/2026/shb-day1/sdt-signals_hu5134872585060797102.webp 1200w&#34;
               src=&#34;https://vaniea.com/post/2026/shb-day1/sdt-signals_hu10532144917058646608.webp&#34;
               width=&#34;760&#34;
               height=&#34;588&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;When we look at decision making more broadly. Its necessary to decide if a signal is positive, null, or a problem.&lt;/p&gt;
&lt;p&gt;The penalty function is asymetric. It is far more expensive to send someone out to check on a detected signal than it is to decide it is not real. This feeds into Normalcy Bias.&lt;/p&gt;
&lt;h3 id=&#34;norman-sadeh-carnegie-mellon-university&#34;&gt;Norman Sadeh (Carnegie Mellon University)&lt;/h3&gt;
&lt;p&gt;A large percentage of security incidents can be traced in some way or another to human error. Someone either doing the wrong thing, or failing to the right thing.&lt;/p&gt;
&lt;p&gt;The other way is to let users ask questions. Users used to search online. Now GenAI is an option, but their accuracy is not the greatest. One of thie issues is that security is a secondary task, so there is no guarentee that people will act on advice. So we have been looking at how to best motivate people: nudging.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;Your Location has been Shared 5,398 Times!&amp;rdquo; this motivates users to look. But these are canned answers and they can be tested for efficacy. But with AI you don&amp;rsquo;t know what the question is going to be and similarly the answers will be dynamically generated.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L.F. Cranor, Y. Agarwal, &amp;ldquo;&lt;a href=&#34;http://dx.doi.org/10.1145/2702123.2702210&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging&lt;/a&gt;&amp;rdquo;, Conference on Human Factors in Computing Systems (CHI 2015), Apr 2015&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Built Chrome plugins - what does it take to get people to act on advice being given to them? Started in the lab asking for people to give feedback.&lt;/p&gt;
&lt;p&gt;Early work used &lt;a href=&#34;https://en.wikipedia.org/wiki/Protection_motivation_theory&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Protection Motivation Theory&lt;/a&gt; (PMT) to help build prompts that are intended to be motivating.&lt;/p&gt;
&lt;p&gt;Study with chat-style Chrome extension. Asked users to ask at least 2 questions a day, which they did and some asked more. Did a daily mini-survey at end of each day. Controled for PMT-style prompt or not.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;PMT did make a big difference.&lt;/li&gt;
&lt;li&gt;Participants were more likely to follow answers generated with prompt engineering&lt;/li&gt;
&lt;li&gt;Some participants kept using the tool after the study&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are many ways to improve the effectivenss of answers generated by LLMs.&lt;/p&gt;
&lt;h3 id=&#34;nathan-malkin-njit&#34;&gt;Nathan Malkin (NJIT)&lt;/h3&gt;
&lt;p&gt;One way to improve usable security and privacy is to remove security decisions from users. Skeptical of security education. It is the opposite of automated security. The security decision is so hard that we have to teach them, and of course once we teach them they will never mess up in the future. Where is all this learning supposed to be happening? Do everyone take classes in it?&lt;/p&gt;
&lt;p&gt;Actually it turns out that K-12 schools are teaching cybersecurity. Have been researching what teachers are teaching to kids:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Most security-related instruction happening in computer science courses - almost always electives&lt;/li&gt;
&lt;li&gt;They are still learning from tech teachers, homeroom teachers. &amp;ldquo;Education&amp;rdquo; happening a range of ways from unstructured interactions all the way to capture the flag.&lt;/li&gt;
&lt;li&gt;Less common though than messaging like &amp;ldquo;don&amp;rsquo;t talk to strangers&amp;rdquo;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Looked at Teaching Standards published by states - what teachers should be teaching at different grade levels.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;About a third are related to cybersecurity (ethics, biases, what is malware, digital citizenship, encryption)&lt;/li&gt;
&lt;li&gt;Standards don&amp;rsquo;t seem to be clear on who is being educated: everyone? future tech professionals?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What is it that schools should be teaching to students?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Interviewed security experts.&lt;/li&gt;
&lt;li&gt;Experts like the teaching standards that exist.
&lt;ul&gt;
&lt;li&gt;Education should emphasize a different kind of thinking.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Security as a habit&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Not so simple&amp;hellip;&lt;/li&gt;
&lt;li&gt;So many stimuli - habits are repeated reactions to stimuli
&lt;ul&gt;
&lt;li&gt;But what are the stimuli we want to condition in security? Stimuli are everywhere and anything can be a threat. Very hard for people to do.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Security as a mindset&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Suspiciousness - &lt;a href=&#34;https://dlnext.acm.org/doi/10.4018/IJCWT.2015070103&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;The role of human operators&amp;rsquo; suspicion in the Detection of cyber attacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Curiosity&lt;/li&gt;
&lt;li&gt;How do we teach these? Suspiciousness and Curiosity are very hard to teach.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;kent-seamons-brigham-young-university&#34;&gt;Kent Seamons (Brigham Young University)&lt;/h3&gt;
&lt;p&gt;Title: Deniability ois more than Protocol Feature&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://ieeexplore.ieee.org/abstract/document/9303352&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Secure Messaging Authentication Ceremonies are Broken&lt;/a&gt; - but most of the time these ceremonies succeed so users may see it as a waste of time.&lt;/p&gt;
&lt;p&gt;What is Cryptographic Deniability?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Millions of users now use tools that have cryptographic deniability - what is users understanding?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Looked at both what users think and what we are seeing in court cases. There needs to be in-app support, legal acceptance and societal acceptance. All three are needed or it does not work.&lt;/p&gt;
&lt;p&gt;Found 228 court cases involving WhatsApp, a third had WhatsApp as major source of evidence. But 0 cases when cryptographic deniability was used in the argument.&lt;/p&gt;
&lt;p&gt;Users were alarmed by deniability - they felt that only bad people would need this. Most expected non-repudiation from their chat tools. The need for deniability is dependent on lots of context like who is being chatted with or over what medium.&lt;/p&gt;
&lt;p&gt;Users would trust more if there was a screenshot of a conversation, even more if someone pulled up their app and showed it to them.&lt;/p&gt;
&lt;p&gt;So tried modifying Signal to allow users to edit messages sent by others. Gave uesrs an example of conflicting transcripts (phone 1 != phone 2). Seeing these edit ability in apps helped people understand deniability much better.&lt;/p&gt;
&lt;p&gt;Idea: giving users a tool to let them try it out and experience security concepts. Would like to explore this idea more.&lt;/p&gt;
&lt;h3 id=&#34;john-darcy-university-of-deleware&#34;&gt;John D’Arcy (University of Deleware)&lt;/h3&gt;
&lt;p&gt;Title: An Idiographic Approach to Behavioral Cybersecurity Research&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://misq.umn.edu/misq/article/48/1/95/2265&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Time will tell the case for idiographic approach to behavioral Cybersecurity research&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Deterance Theory - if you increase the costs of engaging in a behavior then in theory the behavior should reduce&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.simplypsychology.org/nomothetic-idiographic.html&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Nomothetic Approach&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Idiographic approach - person specific approach&lt;/p&gt;
&lt;p&gt;Looked at a large number of papers looking at computing behavior - predicting behavior?&lt;/p&gt;
&lt;p&gt;An idiographic approach allows researchers to consider a single user across time. Employees for example are not equally vulnerable at all points in time. (Have they had their coffee yet?) Provide distinct theoretical insights on behavioral data within a user.&lt;/p&gt;
&lt;p&gt;Users often rationalize actions: &amp;ldquo;no real harm&amp;rdquo;, &amp;ldquo;I had no choice&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;This study looked over the course of a work week.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ego depletion - your ability to self-regulate are diminished over the course of the work week. So more self-rationalize may increase.&lt;/li&gt;
&lt;li&gt;Had people take surveys MWF.&lt;/li&gt;
&lt;li&gt;Measures Neutralization to compliance - as I neutralize more my compliance goes down. Neutralization becomes more influential later in the workweek.&lt;/li&gt;
&lt;li&gt;Outcome highlights that considering the impact of time is important in analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;rick-wash-uw-madison&#34;&gt;Rick Wash (UW-Madison)&lt;/h3&gt;
&lt;p&gt;How people think about making security decisions.&lt;/p&gt;
&lt;p&gt;What are some of the phylisophical aspects to decision making.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We ask people to be careful and not click on dangerious or fraudulent links.&lt;/li&gt;
&lt;li&gt;We ask people to use specific technologies like two factor.&lt;/li&gt;
&lt;li&gt;If you see something say something&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We make many requests of people to do security. Doing security requires the people on the ground helping.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Some requests are reasonable: don&amp;rsquo;t post your SSN online&lt;/li&gt;
&lt;li&gt;Some are impossible: memorize a password so long/complex that a computer cannot guess it&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We make requests all the time. Technology design is all about making requests of people. Policy design (organization policy) makes requests of people.&lt;/p&gt;
&lt;p&gt;What are reasonable requests to make, and what are unreasonable. We normally talk about this in terms of usability. How hard is the request - how difficult/easy is it.&lt;/p&gt;
&lt;p&gt;Usability is not a great framework for understanding security requests. It is a good start, but not enough on its own.&lt;/p&gt;
&lt;p&gt;Why is it that we do security? Someone should be benifit from doing security to make it worth it for everyone to be involved in it. What do those benefits look like? In theory if employees are more security they can get more done. For example the recent Canvas attack means that teachers could not get grading done on time.&lt;/p&gt;
&lt;p&gt;Users want to keep control over their things. Having control over those things is valuable, a security incident causes the loss of that control. Security also gives stability. It enables us to plan for the future. The ability to plan is also important for autonomy - for feeling like we have control over our own lives.&lt;/p&gt;
&lt;p&gt;Connect the benefits of security back to the concepts of security requests. Reasonable security requests should provide benefits for the people who are fulfilling the requests. In cybersecurity we normally ask users to do tasks that should benefit from those actions through having security.&lt;/p&gt;
&lt;p&gt;Started with a simple framework from bioethics. Think about how we train doctors: autonomy, minimize harm, and justice &amp;amp; and fairness. Starting to use this framework to think about how to think about requests. Usability does not handle autonomy and the fairness aspects. A command: &amp;ldquo;do this or get fired&amp;rdquo; is different from autonomy.&lt;/p&gt;
&lt;p&gt;Requests like &amp;ldquo;don&amp;rsquo;t click on links&amp;rdquo; is unreasonable because of the restriction on autonomy.&lt;/p&gt;
&lt;p&gt;Fairness is an interesting because it depends on who the request is being made of. Power relations.&lt;/p&gt;
&lt;h3 id=&#34;qa-2&#34;&gt;Q&amp;amp;A&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;To Kent: how much is the issue around putting users in the drivers seat to help them understand, or is it more around visibility.
&lt;ul&gt;
&lt;li&gt;You only get the benefits of security if you know you have security.&lt;/li&gt;
&lt;li&gt;There are many different facets of security and in different contexts. Making things harder to give confidence is also possibly seen as manipulative.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;To Rick: Nothing to hide, nothing to fear. Justifications of security and how that relates to justifications of security requests.
&lt;ul&gt;
&lt;li&gt;In the national security space we often talk about &lt;a href=&#34;https://iep.utm.edu/soc-cont/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;social contract theory&lt;/a&gt; to gain a collective benefit of national security. How does that map into the cybersecurity relm.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;There is this visibility thing and this social contract thing. Now we have PassKeys. Password managers are very transparent, you can see the random generated email. PassKeys are &amp;ldquo;better&amp;rdquo; than passwords - you cannot see it, you cannot modify it, but trust us that its safe. PassKeys have missed the visibility. We need to stop equating non-compliance with the user being wrong.
&lt;ul&gt;
&lt;li&gt;PassKeys - is there anything we can do to make visible. This is a hard space to work in in terms of explaining what is happening.&lt;/li&gt;
&lt;li&gt;What it means to be transparent for people in this room is likely different from being transparent for an average person on the street.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;There is an imbalance in terms of signal interpretation. The costs of not sending out someone to check on a (potentially false) signal are born by the ship that may be in distress. How can we flip that computation.
&lt;ul&gt;
&lt;li&gt;There are very few false negatives, many false positives. So the operator is always thinking about if it is a false positive. But there is serious negative outcomes in cases where a real signal is ignored. So it is less an incentivization issue. The costs of sending someone out to check is just more immediate and expensive.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;To Nathan - the schools have locked down devices. The schools are punting the problem to the parents. The parents are assuming that the school will handle. And the kids are doing whatever they want.
&lt;ul&gt;
&lt;li&gt;Many of the behaviors they are responding to are happening outside of schools when they are not supervised.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Thinking of cognitive depletion as an explanation of why secure behavior is not followed. But in some situations the secure vs insecure behavior have similar effort.
&lt;ul&gt;
&lt;li&gt;Our perspective is that security is an add on to employee tasks. Most people do not think: &amp;ldquo;yipee! I get to do security.&amp;rdquo; There are possibly boundary conditions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;To Rick: What are we giving away now that 30 years in the future will be considered sensitive.
&lt;ul&gt;
&lt;li&gt;Phone numbers are like that. We used to publish them in phone books. Now it is how we access some apps.&lt;/li&gt;
&lt;li&gt;Hopefully deletion will become more of a thing.&lt;/li&gt;
&lt;li&gt;We have already talked about deepfakes. People may become more pretective of voice/video recordings.&lt;/li&gt;
&lt;li&gt;The future is very scary. Our ability identify people based on seemingly simple data is quite good.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
  </channel>
</rss>
