Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly

Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infras...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Human factors 2017-05, Vol.59 (3), p.420-431
Hauptverfasser: Maqbool, Zahid, Makhijani, Nidhi, Pammi, V. S. Chandrasekhar, Dutt, Varun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 431
container_issue 3
container_start_page 420
container_title Human factors
container_volume 59
creator Maqbool, Zahid
Makhijani, Nidhi
Pammi, V. S. Chandrasekhar
Dutt, Varun
description Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. Method: In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results: Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. Conclusions: If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Application: Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.
doi_str_mv 10.1177/0018720816681888
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1891145128</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sage_id>10.1177_0018720816681888</sage_id><sourcerecordid>1891145128</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</originalsourceid><addsrcrecordid>eNp1kMFL7DAQxoMouk-9e5KAFy99Ztq0Sb0ty6oPFEX0XNNkItVuo0nqY_97s6yKCJ6G4fvNNzMfIQfA_gIIccIYSJEzCVUlQUq5QSZQcpGlBjbJZCVnK32H_AnhiTFW1UW5TXZyyQtW8nJCHubWoo6BOkuvXOzeVOzccEpv8b_yphse6YXSz-gDtc7T-8FgTDgaOo0xCYHO1BiQTgfVL0OyiY7eoE_sgt445_vlHtmyqg-4_1F3yf3Z_G52kV1en_-bTS8zzZmMWatEJUxhueKqKrDgxtStlKBYC3UrWDq4rhTXIrcaEawRtSk1r3SuVFGyvNglx2vfF-9eRwyxWXRBY9-rAd0YGpA1AC8hlwk9-oE-udGnDxJVQ1pVQ8UTxdaU9i4Ej7Z58d1C-WUDrFml3_xMP40cfhiP7QLN18Bn3AnI1kBQj_ht62-G75Gmi6g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1910849164</pqid></control><display><type>article</type><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><source>MEDLINE</source><source>SAGE Complete A-Z List</source><creator>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</creator><creatorcontrib>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</creatorcontrib><description>Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. Method: In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results: Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. Conclusions: If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Application: Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</description><identifier>ISSN: 0018-7208</identifier><identifier>EISSN: 1547-8181</identifier><identifier>DOI: 10.1177/0018720816681888</identifier><identifier>PMID: 28430545</identifier><language>eng</language><publisher>Los Angeles, CA: SAGE Publications</publisher><subject>Adolescent ; Adult ; Computer Security ; Cybercrime ; Cybersecurity ; Damage ; Decision analysis ; Decision Making ; Defensive behavior ; Female ; Game Theory ; Games ; Hackers ; Humans ; Information systems ; Male ; Middle Aged ; Monetary incentives ; Motivation ; Networks ; Optimization ; Reinforcement ; Studies ; Theft ; Young Adult</subject><ispartof>Human factors, 2017-05, Vol.59 (3), p.420-431</ispartof><rights>2016, Human Factors and Ergonomics Society</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</citedby><cites>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/0018720816681888$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/0018720816681888$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,778,782,21802,27907,27908,43604,43605</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/28430545$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Maqbool, Zahid</creatorcontrib><creatorcontrib>Makhijani, Nidhi</creatorcontrib><creatorcontrib>Pammi, V. S. Chandrasekhar</creatorcontrib><creatorcontrib>Dutt, Varun</creatorcontrib><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><title>Human factors</title><addtitle>Hum Factors</addtitle><description>Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. Method: In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results: Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. Conclusions: If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Application: Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</description><subject>Adolescent</subject><subject>Adult</subject><subject>Computer Security</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Damage</subject><subject>Decision analysis</subject><subject>Decision Making</subject><subject>Defensive behavior</subject><subject>Female</subject><subject>Game Theory</subject><subject>Games</subject><subject>Hackers</subject><subject>Humans</subject><subject>Information systems</subject><subject>Male</subject><subject>Middle Aged</subject><subject>Monetary incentives</subject><subject>Motivation</subject><subject>Networks</subject><subject>Optimization</subject><subject>Reinforcement</subject><subject>Studies</subject><subject>Theft</subject><subject>Young Adult</subject><issn>0018-7208</issn><issn>1547-8181</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><recordid>eNp1kMFL7DAQxoMouk-9e5KAFy99Ztq0Sb0ty6oPFEX0XNNkItVuo0nqY_97s6yKCJ6G4fvNNzMfIQfA_gIIccIYSJEzCVUlQUq5QSZQcpGlBjbJZCVnK32H_AnhiTFW1UW5TXZyyQtW8nJCHubWoo6BOkuvXOzeVOzccEpv8b_yphse6YXSz-gDtc7T-8FgTDgaOo0xCYHO1BiQTgfVL0OyiY7eoE_sgt445_vlHtmyqg-4_1F3yf3Z_G52kV1en_-bTS8zzZmMWatEJUxhueKqKrDgxtStlKBYC3UrWDq4rhTXIrcaEawRtSk1r3SuVFGyvNglx2vfF-9eRwyxWXRBY9-rAd0YGpA1AC8hlwk9-oE-udGnDxJVQ1pVQ8UTxdaU9i4Ej7Z58d1C-WUDrFml3_xMP40cfhiP7QLN18Bn3AnI1kBQj_ht62-G75Gmi6g</recordid><startdate>20170501</startdate><enddate>20170501</enddate><creator>Maqbool, Zahid</creator><creator>Makhijani, Nidhi</creator><creator>Pammi, V. S. Chandrasekhar</creator><creator>Dutt, Varun</creator><general>SAGE Publications</general><general>Human Factors and Ergonomics Society</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7T2</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>C1K</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>H8G</scope><scope>JG9</scope><scope>JQ2</scope><scope>K9.</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope></search><sort><creationdate>20170501</creationdate><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><author>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Adolescent</topic><topic>Adult</topic><topic>Computer Security</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Damage</topic><topic>Decision analysis</topic><topic>Decision Making</topic><topic>Defensive behavior</topic><topic>Female</topic><topic>Game Theory</topic><topic>Games</topic><topic>Hackers</topic><topic>Humans</topic><topic>Information systems</topic><topic>Male</topic><topic>Middle Aged</topic><topic>Monetary incentives</topic><topic>Motivation</topic><topic>Networks</topic><topic>Optimization</topic><topic>Reinforcement</topic><topic>Studies</topic><topic>Theft</topic><topic>Young Adult</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Maqbool, Zahid</creatorcontrib><creatorcontrib>Makhijani, Nidhi</creatorcontrib><creatorcontrib>Pammi, V. S. Chandrasekhar</creatorcontrib><creatorcontrib>Dutt, Varun</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Health and Safety Science Abstracts (Full archive)</collection><collection>Materials Business File</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><jtitle>Human factors</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Maqbool, Zahid</au><au>Makhijani, Nidhi</au><au>Pammi, V. S. Chandrasekhar</au><au>Dutt, Varun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</atitle><jtitle>Human factors</jtitle><addtitle>Hum Factors</addtitle><date>2017-05-01</date><risdate>2017</risdate><volume>59</volume><issue>3</issue><spage>420</spage><epage>431</epage><pages>420-431</pages><issn>0018-7208</issn><eissn>1547-8181</eissn><abstract>Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. Method: In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results: Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. Conclusions: If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Application: Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</abstract><cop>Los Angeles, CA</cop><pub>SAGE Publications</pub><pmid>28430545</pmid><doi>10.1177/0018720816681888</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0018-7208
ispartof Human factors, 2017-05, Vol.59 (3), p.420-431
issn 0018-7208
1547-8181
language eng
recordid cdi_proquest_miscellaneous_1891145128
source MEDLINE; SAGE Complete A-Z List
subjects Adolescent
Adult
Computer Security
Cybercrime
Cybersecurity
Damage
Decision analysis
Decision Making
Defensive behavior
Female
Game Theory
Games
Hackers
Humans
Information systems
Male
Middle Aged
Monetary incentives
Motivation
Networks
Optimization
Reinforcement
Studies
Theft
Young Adult
title Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T20%3A56%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Effects%20of%20Motivation:%20Rewarding%20Hackers%20for%20Undetected%20Attacks%20Cause%20Analysts%20to%20Perform%20Poorly&rft.jtitle=Human%20factors&rft.au=Maqbool,%20Zahid&rft.date=2017-05-01&rft.volume=59&rft.issue=3&rft.spage=420&rft.epage=431&rft.pages=420-431&rft.issn=0018-7208&rft.eissn=1547-8181&rft_id=info:doi/10.1177/0018720816681888&rft_dat=%3Cproquest_cross%3E1891145128%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1910849164&rft_id=info:pmid/28430545&rft_sage_id=10.1177_0018720816681888&rfr_iscdi=true