ASSIGNMENT
Cybercrime is inescapable it seems. Nowadays the questions is not if we will become a victim of cybercrime, but when. Still, we should always do our best to keep ourselves as safe as we can. Unfortunately, us people are not the best to adhere to cybersecurity rules (when was the last time you changed your vital passwords?).
In this internship, you will help set-up a new research project to help define how to stimulate behaviour change in respects to cybersecurity behaviour. The internship student has to be willing to do extensive literature research, collaborate to construct a new study crime, and collect data. You can, for example, study how to stimulate people to use password managers in a longitudinal study, or see how we can use VR-environments to study cybersecurity. You will have a lot of freedom in this internship to set-up research and your own contribution to this study is valued an highly appreciated.
KEYWORDS
Cybercrime; behaviour change; crime prevention.
BACKGROUND INFORMATION ORGANIZATION
The section Psychology of Conflict, Risk and Safety at the University of Twente has a distinctive and unique profile in the areas of risk perception and risk communication, conflict and crisis management and the antecedents of risky, antisocial and criminal behaviour. It currently includes 15 research staff members and 6 PhD students. We work from both a psychology and an engineering perspective and cooperate with other scientific disciplines, based on the “high tech, human touch” profile of the University of Twente.
AVAILABILITY
Usually anytime. This internship is open for 1 student.
INTERESTED?
Please contact the internship coordinator Miriam Oostinga (m.s.d.oostinga@utwente.nl).
LITERATURE
- Bullee, J. W., & Junger, M. (2020). How effective are social engineering interventions? A meta-analysis. Information & Computer Security, 28(5), 801-830.
- Kankane, S., DiRusso, C., & Buckley, C. (2018, April). Can we nudge users toward better password management? an initial study. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-6).