SlideShare a Scribd company logo
1 of 46
Cybersecurity Risk Perception
and Communication:
Cultural Theory, White Male
Effect, and more
Lysa Myers and Stephen Cobb
Security Researchers, ESET
Why research the intersection of
cyber, risk, and communication?
• Studies show that perceptions of risk differ
• There’s too much risk in information systems
• Understanding risk perception may help to:
• Improve risk communication
• Reduce risk creation
Cybersecurity can be approached
as a risk management problem
• Reduce the amount of risk and the problem
gets easier to manage
• One way to reduce risk is reduce the
number of vulnerabilities
Risk is the probability that a particular threat-source
will exercise (accidentally trigger or intentionally
exploit) a particular information system vulnerability
• NIST Special Publication 800-30
What is risk, in this context?
Consider 3 major sources of information
system vulnerability
People and companies
that make products
with holes in
People that don’t
practice proper cyber
hygiene
Organizations that
don’t do security
properly
ASSORTED
CORPORATE
LOGOS
3 sources of information system vulnerability
People and companies
that make products
with holes in
People that don’t
practice proper cyber
hygiene
Organizations that
don’t do security
properly
What do all three have in common?
THEY DO NOT HEED EXPERTS!
Failure to
heed the
experts?
• When it comes to
assessing
technology risks
• This is not a new
problem
• Consider nuclear
energy
• Or climate change
97% of actively publishing climate
scientists agree:
Climate-warming trends over the
past century are extremely likely
due to human activities.
Failure to
heed the
experts?
• When it comes to
assessing
technology risks
• This is not a new
problem
• Consider nuclear
energy
• Or climate change
97% of actively publishing climate
scientists agree:
Climate-warming trends over the
past century are extremely likely
due to human activities.
Failure to
heed the
experts?
• When it comes to
assessing
technology risks
• This is not a new
problem
• Consider nuclear
energy
• Or climate change
97% of actively publishing climate
scientists agree:
Climate-warming trends over the
past century are extremely likely
due to human activities.
Failure to
heed the
experts? 97% of actively publishing climate
scientists agree:
Climate-warming trends over the
past century are extremely likely
due to human activities.
Yet the % of US adults who think climate change is
due to human activity has never broken 50%
Why do people reject expert advice?
• Do they not understand the science?
• Don’t they have all the facts?
• Is it a religious thing?
• Are they stupid, or what?
• Yes, it could be “or what?”
Cultural theory argues that risks
are defined, perceived, and
managed according to principles
that inhere in particular forms of
social organization.
• Tansey and Rayner
Why do people reject expert advice?
Communitarianism
GRID
Hierarchy
GROUP Individualism
Egalitarianism
After Douglas, Wildavsky, Flynn, Slovic, Kahan, etc.
Communitarianism
GRID
Hierarchy
GROUP Individualism
Egalitarianism
After Douglas, Wildavsky, Flynn, Slovic, Kahan, etc.
Hierarchical
Individualist
Hierarchical
Communitarianist
Egalitarian
Individualist
Egalitarian
Communitarianist
Community
Rating risks from a
variety of hazards
(1994 edition)
Rating risks from a
variety of hazards
(1994 edition)
When risk ratings were
broken down by gender
and ethnicity they
revealed an interesting
“White Male Effect”
White
Male
Effect
A clear gender difference in risk perception
2.0
2.5
3.0
3.5
4.0
Female
Male
High
Low
Risk
White males saw less risk across the board
2.0
2.5
3.0
3.5
4.0
White Male
White Female
Nonwhite Male
Nonwhite Female
High
Low
Risk
What is the White Male Effect?
• On aggregate, white males see less risk in technology
• Than white females, non-white females, non-white males
• But the people who were doing the study were white
males with serious concerns about risk
• And information security professionals “get” risk, yet (ISC)2
Workforce Study says we’re mostly male (and mostly white)
• So what is going on with these survey results?
Dude, they’re skewed
• Some white males (30%)
drastically underestimate
risk, relative to the mean
• Group-Grid-wise, they are
Hierarchical Individualists
• As a group they tend to
have more education and
higher household incomes
• Also tend to be politically
conservative
GRID
Hierarchy
Community
GROUP
Individualism
Egalitarianism
Hierarchical
Individualist
Hierarchical
Communi-
tarianist
Egalitarian
Individualist
Egalitarian
Communi-
tarianist
But there is
good skew
too
E.g. some white males are
very concerned about
global warming.
For more examples see:
CulturalCognition.net
Let’s find out if WME affects perception of
risks from information technology
• We asked people to rate 15 technology hazards
• including some arising from digital technology
• If WME exists with respect to these “cyber-risks”
• Can we use the results to improve risk communication
• to developers, IT professionals, CEOs, boards?
• If no WME, can we still learn something useful?
global warming
private gun
ownership
medical X-rays
air pollution
"fracking"
genetically modified foods
nuclear
power
motor vehicle
accidents
disposal of hazardous
wastes in landfill
government monitoring of
emails and web searches
theft or exposure of
private data criminals hacking into
computer systems
corporate computer
network failures
companies accumulating
your personal data
artificial intelligence
We selected 9+6 hazards
Presenting the risk of certain hazards
• As individuals and as a society, we face a number of possible
hazards. Some threaten people’s health, safety, or financial
well-being directly. Others indirectly threaten health, safety,
or financial well-being through the damage they can impose
on the environment or the economy. The next set of
questions asks how much risk you think the following items
pose to human health, safety, or prosperity. In each case you
can answer from "No risk at all" to "Very high risk”.
Criminal hacking tops US risk list
2
3
4
5
6
(n=740)
High
Low
Risk
Cyber hazard risks relative to other risks
Medical X-rays
Artificial Intelligence
Gun ownership
GM food
Network failures
Nuclear power
Fracking
Gov data monitoring
Accumulating PII
Global warming
Motor vehicles
PII theft/exposure
Hazardous waste
Air pollution
Criminal hacking
Higher
risk
Sanity check: before our main study we surveyed US
adults to see if concern about cyber risks was real
• Do you think problems with technology, like computer hacking and
network outages, pose a risk to your security and well-being?
0% 10% 20% 30% 40%
Almost no
risk
Slight risk
Moderate
risk
High risk
We also looked to see if there was a male effect
• And there was
0% 10% 20% 30% 40%
Almost no risk
Slight risk
Moderate risk
High risk
Female
Male
(n=847)
For all of our 9+6 hazards, women see more risk
2
3
4
5
6
Female
Male
(n=740)
High
Low
Risk
For all of our 9+6 hazards, women see more risk
2
3
4
5
6
Female
Male
(n=740)
High
Low
Risk
Women see more risk in “cyber” hazards
Medical X-rays
Artificial Intelligence
Gun ownership
GM food
Nuclear power
Fracking
Network failures
Gov data monitoring
Accumulating PII
Global warming
Motor vehicles
Hazardous waste
PII theft/exposure
Air pollution
Criminal hacking
Male
Female
(n=740)
On average, white people see less risk
2
3
4
5
6
White
Nonwhite
(n=710)
High
Low
Risk
And the White Male Effect is there, but…
2
3
4
5
6
White Male
White Female
Non-white Male
Non-white Female
(n=710)
High
Low
Risk
Mixed signals in cyber
3
4
5
6
White Male
White Female
Non-white Male
Non-white Female
(n=710)
Notable differences in cultural alignment of cyber risk
Hierarchical individualists and criminal hacking risk
What does it all mean (1/4)?
• Some white males underestimate some
cyber risks relative to the mean
• In organizations where those white males
make most technology-related decisions
• Greater gender and ethnic diversity could
improve cyber-risk sensitivity
• In general: Greater gender and ethnic diversity
in technology company boardrooms could:
• Reduce the number of vulnerabilities shipped
• Improve risk assessment and security posture
Cyber risk perception also varies by age
0%
10%
20%
30%
40%
50%
60%
70%
18-29 30-44 45-59 60+
Criminal hacking
PII exposure
Percentage of survey
respondents who
rated risk “high” or
“very high” for
(n=740)
And remember education and income?
0%
10%
20%
30%
40%
50%
60%
70%
No degree Degree
0%
10%
20%
30%
40%
50%
60%
70%
Uncertified P-certified
0%
10%
20%
30%
40%
50%
60%
70%
Under $75K Over $75K
Percentage of people who rated criminal hacking as high risk or very high risk
What does it all mean (2/4)?
• The effectiveness with which cyber-risk is
communicated may be improved through
better understanding of Culture Theory
• Consider: the Cultural Cognition Project
Cultural cognition
• the tendency of individuals to conform their
beliefs about disputed matters of fact…
to values that define their cultural identities.
• CulturalCognition.net
Cultural cognition and communication
• Considering the power of cultural alignment to influence
risk perception, independent of factors such as education
and intelligence, suggests new ways of communicating risk
• Presenting information “in a manner that affirms rather
than threatens people's values” (Cohen)
• Making sure that sound information is “vouched for by a
diverse set of experts” (Kahan)
• Reducing polarization by presenting advocates with diverse
values on both sides of the issue (Kahan)
What does this all mean (3/4)?
• Companies that rely on the use and adoption of
information technology should be very concerned
about the public’s perception of cyber-risks
Global warming
Motor vehicles
PII theft/exposure
Hazardous waste
Air pollution
Criminal hacking
What does it all mean (4/4)?
• We can probably do better at communicating
risk when we have a better understanding of
why risk perceptions vary
• So let’s do more research on this…
Thank you!
Lysa.Myers@ESET.com
Stephen.Cobb@ESET.com
www.WeLiveSecurity.com

More Related Content

What's hot

Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutiry
sefreed
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 

What's hot (20)

Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutiry
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 

Similar to Cybersecurity Risk Perception and Communication

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Adrian Wright
 
475 media effects methods 2012 up
475 media effects methods 2012 up475 media effects methods 2012 up
475 media effects methods 2012 up
mpeffl
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Sara-Jayne Terp
 
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
Health Catalyst
 
How Are Women Making a Difference in Cyber-security?
How Are Women Making a Difference in Cyber-security?How Are Women Making a Difference in Cyber-security?
How Are Women Making a Difference in Cyber-security?
PECB
 

Similar to Cybersecurity Risk Perception and Communication (20)

Catherine M. Hammack, "Thought Leader Perspectives on Risks and Protections i...
Catherine M. Hammack, "Thought Leader Perspectives on Risks and Protections i...Catherine M. Hammack, "Thought Leader Perspectives on Risks and Protections i...
Catherine M. Hammack, "Thought Leader Perspectives on Risks and Protections i...
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
NSBA2010
NSBA2010NSBA2010
NSBA2010
 
Risk Perception and Communication
Risk Perception and CommunicationRisk Perception and Communication
Risk Perception and Communication
 
Risk Characterization, George Gray
Risk Characterization, George GrayRisk Characterization, George Gray
Risk Characterization, George Gray
 
475 media effects methods 2012 up
475 media effects methods 2012 up475 media effects methods 2012 up
475 media effects methods 2012 up
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...There Is A 90% Probability That Your Son Is Pregnant:  Predicting The Future ...
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 era
 
WSDM2015Tutorial.pdf
WSDM2015Tutorial.pdfWSDM2015Tutorial.pdf
WSDM2015Tutorial.pdf
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Davos 2014-Renn
Davos 2014-RennDavos 2014-Renn
Davos 2014-Renn
 
ICA Presentation 2013
ICA Presentation 2013ICA Presentation 2013
ICA Presentation 2013
 
How (Not) To Lie With Statistics.pptx
How (Not) To Lie With Statistics.pptxHow (Not) To Lie With Statistics.pptx
How (Not) To Lie With Statistics.pptx
 
Does the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidenceDoes the Internet harm children's health? A critical review of the evidence
Does the Internet harm children's health? A critical review of the evidence
 
How Are Women Making a Difference in Cyber-security?
How Are Women Making a Difference in Cyber-security?How Are Women Making a Difference in Cyber-security?
How Are Women Making a Difference in Cyber-security?
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 

More from Stephen Cobb

More from Stephen Cobb (20)

Cybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptxCybercrime-as-health-crisis-shared.pptx
Cybercrime-as-health-crisis-shared.pptx
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISO
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
 
Malware and the risks of weaponizing code
Malware and the risks of weaponizing codeMalware and the risks of weaponizing code
Malware and the risks of weaponizing code
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Endpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategyEndpoint and Server: The belt and braces anti-malware strategy
Endpoint and Server: The belt and braces anti-malware strategy
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 

Cybersecurity Risk Perception and Communication

  • 1. Cybersecurity Risk Perception and Communication: Cultural Theory, White Male Effect, and more Lysa Myers and Stephen Cobb Security Researchers, ESET
  • 2. Why research the intersection of cyber, risk, and communication? • Studies show that perceptions of risk differ • There’s too much risk in information systems • Understanding risk perception may help to: • Improve risk communication • Reduce risk creation
  • 3. Cybersecurity can be approached as a risk management problem • Reduce the amount of risk and the problem gets easier to manage • One way to reduce risk is reduce the number of vulnerabilities
  • 4. Risk is the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) a particular information system vulnerability • NIST Special Publication 800-30 What is risk, in this context?
  • 5. Consider 3 major sources of information system vulnerability People and companies that make products with holes in People that don’t practice proper cyber hygiene Organizations that don’t do security properly ASSORTED CORPORATE LOGOS
  • 6. 3 sources of information system vulnerability People and companies that make products with holes in People that don’t practice proper cyber hygiene Organizations that don’t do security properly What do all three have in common? THEY DO NOT HEED EXPERTS!
  • 7. Failure to heed the experts? • When it comes to assessing technology risks • This is not a new problem • Consider nuclear energy • Or climate change 97% of actively publishing climate scientists agree: Climate-warming trends over the past century are extremely likely due to human activities.
  • 8. Failure to heed the experts? • When it comes to assessing technology risks • This is not a new problem • Consider nuclear energy • Or climate change 97% of actively publishing climate scientists agree: Climate-warming trends over the past century are extremely likely due to human activities.
  • 9. Failure to heed the experts? • When it comes to assessing technology risks • This is not a new problem • Consider nuclear energy • Or climate change 97% of actively publishing climate scientists agree: Climate-warming trends over the past century are extremely likely due to human activities.
  • 10. Failure to heed the experts? 97% of actively publishing climate scientists agree: Climate-warming trends over the past century are extremely likely due to human activities. Yet the % of US adults who think climate change is due to human activity has never broken 50%
  • 11. Why do people reject expert advice? • Do they not understand the science? • Don’t they have all the facts? • Is it a religious thing? • Are they stupid, or what? • Yes, it could be “or what?”
  • 12. Cultural theory argues that risks are defined, perceived, and managed according to principles that inhere in particular forms of social organization. • Tansey and Rayner Why do people reject expert advice?
  • 14. Communitarianism GRID Hierarchy GROUP Individualism Egalitarianism After Douglas, Wildavsky, Flynn, Slovic, Kahan, etc. Hierarchical Individualist Hierarchical Communitarianist Egalitarian Individualist Egalitarian Communitarianist Community
  • 15. Rating risks from a variety of hazards (1994 edition)
  • 16. Rating risks from a variety of hazards (1994 edition) When risk ratings were broken down by gender and ethnicity they revealed an interesting “White Male Effect” White Male Effect
  • 17. A clear gender difference in risk perception 2.0 2.5 3.0 3.5 4.0 Female Male High Low Risk
  • 18. White males saw less risk across the board 2.0 2.5 3.0 3.5 4.0 White Male White Female Nonwhite Male Nonwhite Female High Low Risk
  • 19. What is the White Male Effect? • On aggregate, white males see less risk in technology • Than white females, non-white females, non-white males • But the people who were doing the study were white males with serious concerns about risk • And information security professionals “get” risk, yet (ISC)2 Workforce Study says we’re mostly male (and mostly white) • So what is going on with these survey results?
  • 20. Dude, they’re skewed • Some white males (30%) drastically underestimate risk, relative to the mean • Group-Grid-wise, they are Hierarchical Individualists • As a group they tend to have more education and higher household incomes • Also tend to be politically conservative GRID Hierarchy Community GROUP Individualism Egalitarianism Hierarchical Individualist Hierarchical Communi- tarianist Egalitarian Individualist Egalitarian Communi- tarianist
  • 21. But there is good skew too E.g. some white males are very concerned about global warming. For more examples see: CulturalCognition.net
  • 22. Let’s find out if WME affects perception of risks from information technology • We asked people to rate 15 technology hazards • including some arising from digital technology • If WME exists with respect to these “cyber-risks” • Can we use the results to improve risk communication • to developers, IT professionals, CEOs, boards? • If no WME, can we still learn something useful?
  • 23. global warming private gun ownership medical X-rays air pollution "fracking" genetically modified foods nuclear power motor vehicle accidents disposal of hazardous wastes in landfill government monitoring of emails and web searches theft or exposure of private data criminals hacking into computer systems corporate computer network failures companies accumulating your personal data artificial intelligence We selected 9+6 hazards
  • 24. Presenting the risk of certain hazards • As individuals and as a society, we face a number of possible hazards. Some threaten people’s health, safety, or financial well-being directly. Others indirectly threaten health, safety, or financial well-being through the damage they can impose on the environment or the economy. The next set of questions asks how much risk you think the following items pose to human health, safety, or prosperity. In each case you can answer from "No risk at all" to "Very high risk”.
  • 25.
  • 26. Criminal hacking tops US risk list 2 3 4 5 6 (n=740) High Low Risk
  • 27. Cyber hazard risks relative to other risks Medical X-rays Artificial Intelligence Gun ownership GM food Network failures Nuclear power Fracking Gov data monitoring Accumulating PII Global warming Motor vehicles PII theft/exposure Hazardous waste Air pollution Criminal hacking Higher risk
  • 28. Sanity check: before our main study we surveyed US adults to see if concern about cyber risks was real • Do you think problems with technology, like computer hacking and network outages, pose a risk to your security and well-being? 0% 10% 20% 30% 40% Almost no risk Slight risk Moderate risk High risk
  • 29. We also looked to see if there was a male effect • And there was 0% 10% 20% 30% 40% Almost no risk Slight risk Moderate risk High risk Female Male (n=847)
  • 30. For all of our 9+6 hazards, women see more risk 2 3 4 5 6 Female Male (n=740) High Low Risk
  • 31. For all of our 9+6 hazards, women see more risk 2 3 4 5 6 Female Male (n=740) High Low Risk
  • 32. Women see more risk in “cyber” hazards Medical X-rays Artificial Intelligence Gun ownership GM food Nuclear power Fracking Network failures Gov data monitoring Accumulating PII Global warming Motor vehicles Hazardous waste PII theft/exposure Air pollution Criminal hacking Male Female (n=740)
  • 33. On average, white people see less risk 2 3 4 5 6 White Nonwhite (n=710) High Low Risk
  • 34. And the White Male Effect is there, but… 2 3 4 5 6 White Male White Female Non-white Male Non-white Female (n=710) High Low Risk
  • 35. Mixed signals in cyber 3 4 5 6 White Male White Female Non-white Male Non-white Female (n=710)
  • 36. Notable differences in cultural alignment of cyber risk
  • 37. Hierarchical individualists and criminal hacking risk
  • 38. What does it all mean (1/4)? • Some white males underestimate some cyber risks relative to the mean • In organizations where those white males make most technology-related decisions • Greater gender and ethnic diversity could improve cyber-risk sensitivity • In general: Greater gender and ethnic diversity in technology company boardrooms could: • Reduce the number of vulnerabilities shipped • Improve risk assessment and security posture
  • 39. Cyber risk perception also varies by age 0% 10% 20% 30% 40% 50% 60% 70% 18-29 30-44 45-59 60+ Criminal hacking PII exposure Percentage of survey respondents who rated risk “high” or “very high” for (n=740)
  • 40. And remember education and income? 0% 10% 20% 30% 40% 50% 60% 70% No degree Degree 0% 10% 20% 30% 40% 50% 60% 70% Uncertified P-certified 0% 10% 20% 30% 40% 50% 60% 70% Under $75K Over $75K Percentage of people who rated criminal hacking as high risk or very high risk
  • 41. What does it all mean (2/4)? • The effectiveness with which cyber-risk is communicated may be improved through better understanding of Culture Theory • Consider: the Cultural Cognition Project
  • 42. Cultural cognition • the tendency of individuals to conform their beliefs about disputed matters of fact… to values that define their cultural identities. • CulturalCognition.net
  • 43. Cultural cognition and communication • Considering the power of cultural alignment to influence risk perception, independent of factors such as education and intelligence, suggests new ways of communicating risk • Presenting information “in a manner that affirms rather than threatens people's values” (Cohen) • Making sure that sound information is “vouched for by a diverse set of experts” (Kahan) • Reducing polarization by presenting advocates with diverse values on both sides of the issue (Kahan)
  • 44. What does this all mean (3/4)? • Companies that rely on the use and adoption of information technology should be very concerned about the public’s perception of cyber-risks Global warming Motor vehicles PII theft/exposure Hazardous waste Air pollution Criminal hacking
  • 45. What does it all mean (4/4)? • We can probably do better at communicating risk when we have a better understanding of why risk perceptions vary • So let’s do more research on this…

Editor's Notes

  1. Hi, I am Stephen Cobb and this is Lysa Myers. We are researchers at ESET, a security software company that has been around for 30 years and is based in Slovakia, which is part of the European Union, and a fully paid up member of the NATO alliance (humor). We belong to the US Research Team which is based in San Diego.
  2. When you work in information security you quickly realize that some people see risk where others do not. Some see less risk than others. This has practical implications when it comes to securing information systems. Clearly there is a lot of risk in information systems. One way to reduce that risk would be at the source, namely product design and system design. It would help if more product designers and system architects were more sensitive to risk – we think a better understanding of why perceptions of risk differ between different people could help us with that.
  3. The classic NIST definition of risk in information systems makes clear the role of vulnerabilities, so where do these come from?
  4. The classic NIST definition of risk in information systems makes clear the role of vulnerabilities, so where do these come from?
  5. Well here are three sources of vulnerability (these are not THE or the only sources, but they are 3 that information security folks will recognize. 1. People and companies that make products with holes in – like these internet connected toys, or these internet connected DVRs used in botnet attacks that cost US companies millions of dollars. Or this Jeep, one of the 1,4 million vehicles that were found to be seriously hackable, and seriously hard to patch. 2. People that don’t practice proper cyber hygiene – like over-riding the security settings on this mobile device, or forgetting vital code in this internet voting software. 3. Organizations don’t do security properly – or to the appropriate level. For example, here’s a healthcare company that It failed to fully assess the potential risks and vulnerabilities to its patient data, also failed to implement physical access controls at a large data center, and didn’t have security agreements with its business associates.
  6. At a recent Applied Human Factors conference, just about every presentation on human factors in cybersecurity cited IBM’s 1994 statistic that “over 95 percent of all incidents investigated recognize “human error” as a contributing factor.” (IBM 2015 Cyber Security Intelligence Index) “Still, it’s important to note that more often than not, breaches caused by insiders are unintentional. In fact, over 95 percent of these breaches are caused by human error.
  7. For example: There’s a lot of scientific information pointing to rising temperature. NASA Goddard Institute for Space Studies - http://data.giss.nasa.gov/gistemp/graphs/ Global mean surface-temperature change from 1880 to 2016, relative to the 1951–1980 mean. The black line is the global annual mean, and the red line is the five-year local regression line. The blue uncertainty bars show a 95% confidence interval. http://www.pewinternet.org/2016/10/04/public-views-on-climate-change-and-climate-scientists/ https://climate.nasa.gov/scientific-consensus/
  8. For example: There’s a lot of scientific information pointing to rising temperature. NASA Goddard Institute for Space Studies - http://data.giss.nasa.gov/gistemp/graphs/ Global mean surface-temperature change from 1880 to 2016, relative to the 1951–1980 mean. The black line is the global annual mean, and the red line is the five-year local regression line. The blue uncertainty bars show a 95% confidence interval. http://www.pewinternet.org/2016/10/04/public-views-on-climate-change-and-climate-scientists/ https://climate.nasa.gov/scientific-consensus/
  9. For example: There’s a lot of scientific information pointing to rising temperature. NASA Goddard Institute for Space Studies - http://data.giss.nasa.gov/gistemp/graphs/ Global mean surface-temperature change from 1880 to 2016, relative to the 1951–1980 mean. The black line is the global annual mean, and the red line is the five-year local regression line. The blue uncertainty bars show a 95% confidence interval. http://www.pewinternet.org/2016/10/04/public-views-on-climate-change-and-climate-scientists/ https://climate.nasa.gov/scientific-consensus/
  10. On aggregate, popular opinion does not align with the scientific. NASA Goddard Institute for Space Studies - http://data.giss.nasa.gov/gistemp/graphs/ Global mean surface-temperature change from 1880 to 2016, relative to the 1951–1980 mean. The black line is the global annual mean, and the red line is the five-year local regression line. The blue uncertainty bars show a 95% confidence interval. http://www.pewinternet.org/2016/10/04/public-views-on-climate-change-and-climate-scientists/ https://climate.nasa.gov/scientific-consensus/
  11. It can be frustrating when people reject your advice. A lot of explanations are put forward. We think the answer is “or what?” where what is Culture Theory and Cultural Ccognition.
  12. 1982 Mary Douglas and Aaron Wildavsky 1982 Risk and Culture : An Essay on the Selection of Technical and Environmental Dangers. Cultural Theory asserts that structures of social organization endow individuals with perceptions that reinforce those structures in competition against alternative ones.
  13. Group – grid, then named groups
  14. Group – grid, then named groups
  15. The survey 1994 Flynn, Slovic, Mertz
  16. The survey 1994 Flynn, Slovic, Mertz
  17. The survey 1994 Flynn, Slovic, Mertz
  18. The survey 1994 survey by Flynn, Slovic, Mertz.
  19. White Male Effect
  20. White Male Effect
  21. Cultural Cognition dot net
  22. White Male Effect
  23. A mixed of previously surveyed hazards and cyber hazards
  24. This is the standard pre-amble to the questions about risks posed by certain hazards
  25. The survey – not security specific, not branded. Neutral
  26. Bars represented weighted average risk ratings for each of the 15 hazards
  27. Bars represented weighted average risk ratings for each of the 15 hazards
  28. Google Consumer Survey (n=847) earlier this year showed a high level of concern.
  29. And suggested WME might be at work
  30. This is final dataset
  31. This is final dataset
  32. This is final dataset
  33. This is final dataset
  34. This is final dataset
  35. This is final dataset
  36. Differing patterns on Group-Grid
  37. Differing patterns on Group-Grid
  38. Greater gender and ethnic diversity could improve cyber-risk sensitivity
  39. 1982 Mary Douglas and Aaron Wildavsky Risk and Culture : An Essay on the Selection of Technical and Environmental Dangers.
  40. Americans are worried about hacking!
  41. www.WeLiveSecurity.com