Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly
Objective: The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Background: Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infras...
Gespeichert in:
Veröffentlicht in: | Human factors 2017-05, Vol.59 (3), p.420-431 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 431 |
---|---|
container_issue | 3 |
container_start_page | 420 |
container_title | Human factors |
container_volume | 59 |
creator | Maqbool, Zahid Makhijani, Nidhi Pammi, V. S. Chandrasekhar Dutt, Varun |
description | Objective:
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game.
Background:
Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area.
Method:
In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers.
Results:
Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior.
Conclusions:
If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks.
Application:
Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage. |
doi_str_mv | 10.1177/0018720816681888 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1891145128</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sage_id>10.1177_0018720816681888</sage_id><sourcerecordid>1891145128</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</originalsourceid><addsrcrecordid>eNp1kMFL7DAQxoMouk-9e5KAFy99Ztq0Sb0ty6oPFEX0XNNkItVuo0nqY_97s6yKCJ6G4fvNNzMfIQfA_gIIccIYSJEzCVUlQUq5QSZQcpGlBjbJZCVnK32H_AnhiTFW1UW5TXZyyQtW8nJCHubWoo6BOkuvXOzeVOzccEpv8b_yphse6YXSz-gDtc7T-8FgTDgaOo0xCYHO1BiQTgfVL0OyiY7eoE_sgt445_vlHtmyqg-4_1F3yf3Z_G52kV1en_-bTS8zzZmMWatEJUxhueKqKrDgxtStlKBYC3UrWDq4rhTXIrcaEawRtSk1r3SuVFGyvNglx2vfF-9eRwyxWXRBY9-rAd0YGpA1AC8hlwk9-oE-udGnDxJVQ1pVQ8UTxdaU9i4Ej7Z58d1C-WUDrFml3_xMP40cfhiP7QLN18Bn3AnI1kBQj_ht62-G75Gmi6g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1910849164</pqid></control><display><type>article</type><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><source>MEDLINE</source><source>SAGE Complete A-Z List</source><creator>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</creator><creatorcontrib>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</creatorcontrib><description>Objective:
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game.
Background:
Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area.
Method:
In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers.
Results:
Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior.
Conclusions:
If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks.
Application:
Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</description><identifier>ISSN: 0018-7208</identifier><identifier>EISSN: 1547-8181</identifier><identifier>DOI: 10.1177/0018720816681888</identifier><identifier>PMID: 28430545</identifier><language>eng</language><publisher>Los Angeles, CA: SAGE Publications</publisher><subject>Adolescent ; Adult ; Computer Security ; Cybercrime ; Cybersecurity ; Damage ; Decision analysis ; Decision Making ; Defensive behavior ; Female ; Game Theory ; Games ; Hackers ; Humans ; Information systems ; Male ; Middle Aged ; Monetary incentives ; Motivation ; Networks ; Optimization ; Reinforcement ; Studies ; Theft ; Young Adult</subject><ispartof>Human factors, 2017-05, Vol.59 (3), p.420-431</ispartof><rights>2016, Human Factors and Ergonomics Society</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</citedby><cites>FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/0018720816681888$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/0018720816681888$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,778,782,21802,27907,27908,43604,43605</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/28430545$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Maqbool, Zahid</creatorcontrib><creatorcontrib>Makhijani, Nidhi</creatorcontrib><creatorcontrib>Pammi, V. S. Chandrasekhar</creatorcontrib><creatorcontrib>Dutt, Varun</creatorcontrib><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><title>Human factors</title><addtitle>Hum Factors</addtitle><description>Objective:
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game.
Background:
Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area.
Method:
In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers.
Results:
Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior.
Conclusions:
If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks.
Application:
Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</description><subject>Adolescent</subject><subject>Adult</subject><subject>Computer Security</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Damage</subject><subject>Decision analysis</subject><subject>Decision Making</subject><subject>Defensive behavior</subject><subject>Female</subject><subject>Game Theory</subject><subject>Games</subject><subject>Hackers</subject><subject>Humans</subject><subject>Information systems</subject><subject>Male</subject><subject>Middle Aged</subject><subject>Monetary incentives</subject><subject>Motivation</subject><subject>Networks</subject><subject>Optimization</subject><subject>Reinforcement</subject><subject>Studies</subject><subject>Theft</subject><subject>Young Adult</subject><issn>0018-7208</issn><issn>1547-8181</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><recordid>eNp1kMFL7DAQxoMouk-9e5KAFy99Ztq0Sb0ty6oPFEX0XNNkItVuo0nqY_97s6yKCJ6G4fvNNzMfIQfA_gIIccIYSJEzCVUlQUq5QSZQcpGlBjbJZCVnK32H_AnhiTFW1UW5TXZyyQtW8nJCHubWoo6BOkuvXOzeVOzccEpv8b_yphse6YXSz-gDtc7T-8FgTDgaOo0xCYHO1BiQTgfVL0OyiY7eoE_sgt445_vlHtmyqg-4_1F3yf3Z_G52kV1en_-bTS8zzZmMWatEJUxhueKqKrDgxtStlKBYC3UrWDq4rhTXIrcaEawRtSk1r3SuVFGyvNglx2vfF-9eRwyxWXRBY9-rAd0YGpA1AC8hlwk9-oE-udGnDxJVQ1pVQ8UTxdaU9i4Ej7Z58d1C-WUDrFml3_xMP40cfhiP7QLN18Bn3AnI1kBQj_ht62-G75Gmi6g</recordid><startdate>20170501</startdate><enddate>20170501</enddate><creator>Maqbool, Zahid</creator><creator>Makhijani, Nidhi</creator><creator>Pammi, V. S. Chandrasekhar</creator><creator>Dutt, Varun</creator><general>SAGE Publications</general><general>Human Factors and Ergonomics Society</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7T2</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>C1K</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>H8G</scope><scope>JG9</scope><scope>JQ2</scope><scope>K9.</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope></search><sort><creationdate>20170501</creationdate><title>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</title><author>Maqbool, Zahid ; Makhijani, Nidhi ; Pammi, V. S. Chandrasekhar ; Dutt, Varun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-ba767d3f4a4a63e34dd9b881a0b19b7084396a4c72fcee1fd79d5c46c2aa35023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Adolescent</topic><topic>Adult</topic><topic>Computer Security</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Damage</topic><topic>Decision analysis</topic><topic>Decision Making</topic><topic>Defensive behavior</topic><topic>Female</topic><topic>Game Theory</topic><topic>Games</topic><topic>Hackers</topic><topic>Humans</topic><topic>Information systems</topic><topic>Male</topic><topic>Middle Aged</topic><topic>Monetary incentives</topic><topic>Motivation</topic><topic>Networks</topic><topic>Optimization</topic><topic>Reinforcement</topic><topic>Studies</topic><topic>Theft</topic><topic>Young Adult</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Maqbool, Zahid</creatorcontrib><creatorcontrib>Makhijani, Nidhi</creatorcontrib><creatorcontrib>Pammi, V. S. Chandrasekhar</creatorcontrib><creatorcontrib>Dutt, Varun</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Health and Safety Science Abstracts (Full archive)</collection><collection>Materials Business File</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><jtitle>Human factors</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Maqbool, Zahid</au><au>Makhijani, Nidhi</au><au>Pammi, V. S. Chandrasekhar</au><au>Dutt, Varun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly</atitle><jtitle>Human factors</jtitle><addtitle>Hum Factors</addtitle><date>2017-05-01</date><risdate>2017</risdate><volume>59</volume><issue>3</issue><spage>420</spage><epage>431</epage><pages>420-431</pages><issn>0018-7208</issn><eissn>1547-8181</eissn><abstract>Objective:
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game.
Background:
Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area.
Method:
In an experiment, participants were randomly assigned to three between-subjects conditions (n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker’s successful attack was 10 times the reward for analyst’s successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst’s successful defense was 10 times the reward for hacker’s successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers.
Results:
Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior.
Conclusions:
If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks.
Application:
Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.</abstract><cop>Los Angeles, CA</cop><pub>SAGE Publications</pub><pmid>28430545</pmid><doi>10.1177/0018720816681888</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0018-7208 |
ispartof | Human factors, 2017-05, Vol.59 (3), p.420-431 |
issn | 0018-7208 1547-8181 |
language | eng |
recordid | cdi_proquest_miscellaneous_1891145128 |
source | MEDLINE; SAGE Complete A-Z List |
subjects | Adolescent Adult Computer Security Cybercrime Cybersecurity Damage Decision analysis Decision Making Defensive behavior Female Game Theory Games Hackers Humans Information systems Male Middle Aged Monetary incentives Motivation Networks Optimization Reinforcement Studies Theft Young Adult |
title | Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T20%3A56%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Effects%20of%20Motivation:%20Rewarding%20Hackers%20for%20Undetected%20Attacks%20Cause%20Analysts%20to%20Perform%20Poorly&rft.jtitle=Human%20factors&rft.au=Maqbool,%20Zahid&rft.date=2017-05-01&rft.volume=59&rft.issue=3&rft.spage=420&rft.epage=431&rft.pages=420-431&rft.issn=0018-7208&rft.eissn=1547-8181&rft_id=info:doi/10.1177/0018720816681888&rft_dat=%3Cproquest_cross%3E1891145128%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1910849164&rft_id=info:pmid/28430545&rft_sage_id=10.1177_0018720816681888&rfr_iscdi=true |