Distributed and Embedded Systems (DIES)

Download Report

Transcript Distributed and Embedded Systems (DIES)

Research methods
Marianne Junger
[Fie09] A. Field. Discovering statistics using SPSS. Sage, London, 3rd edition, Jan
2009. http://www.uk.sagepub.com/field3e/samplech.htm.
Science
Some scientific questions are about logic,
like mathematics & philosophy (perhaps)
Some issues are about finding out how
things are in the real world
Empirical research
• Is used to study ‘real world’
• E.g., human behaviour & physics
2
Cyber-crime science
Many questions are ‘empirical questions’
What sort of math-teaching helps children
most to learn mathematics ?
Is crime increasing or decreasing?
Does drug use lead to crime?
Does technology ‘cause’ crime?
Does ICT cause crime?
These questions are a matter of correct
empirical research
3
Cyber-crime science
Why is empirical research important?
Many cognitive biases colour our judgment
Field of crime & Criminal Justice: ‘faith
triumphs over facts’ [Wal06a]
Examples of sensitive issues:
1. Does visible police patrol help to combat
crime?
2. Does ‘Scare straight’ help to reduce
crime among first time offenders?
4
[Wal06a] S. Walker. Sense and Nonsense About Crime and Drugs: A Policy Guide.
Cengage Learning, sixth edition, 2006.
Cyber-crime science
http://www.cengage.com/asiahed/instructor.do?product_isbn=9780534616540.
Systematic data collection to avoid bias
We want to find the ‘correct’ answer
• Independent of – our own - beliefs
Aim: finding regularities- patterns in
behaviour
For aggregations – groups –not individuals
5
Cyber-crime science
Research cycle [Fie09]
6
Cyber-crime science
Correct procedures & methods to avoid errors
1. Think about causality
2. Explicit formulation of your research question
3. Units of analysis
4. Identifying main concepts
5. Determining how to measure them
6. Choosing a research design
Separate issues but linked within your study
7
Cyber-crime science
1. Causality: three conditions
 Time order: cause precedes effect.
• Do drugs lead to crime?
• Does crime lead to unemployment?
Association between cause and effect
No third variable causes both ‘cause’ and
effect = spuriousness
• For instance: association between crime
& unemployment
8
Cyber-crime science
Spuriousness
 Association between ‘unemployment-age
30’ and ‘crime-age 30’ is spurious: it
disappears after controlling for IQ-age 12
AGE 12:
Low IQ
Poor school results
Age 30
Unemployed
Age 30
Crime
9
Cyber-crime science
2. Explicit formulation of your research
question
Some questions are hard to answer
• Was Julius Cesar a happy person? =
subjective
• Could we have avoided WWII? = history
• Should we interfere with military action
in Syria? = moral/political
Criterion: You need to be able to set-up your
study as required by methodological rules
10
Cyber-crime science
2. Explicit formulation of your research
question (contd.)
Relationships between concepts
1. Is crime decreasing or increasing?
2. Is age related to crime?
3. Are unemployment and Crime linked?
Causality
4. What leads to a decrease in crime?
5. Is unemployment causing crime?
11
Cyber-crime science
3. Units of analysis
1. Individuals: children, adolescents, citizens
2. Pairs of individuals: mother & daughter,
offender & victim
3. Groups: countries, provinces,
organization(s)
4. ‘Social artefacts’= product of behaviour:
Crimes/incidents, alcohol related crashes
5. Combinations.
12
Cyber-crime science
4. Identifying main concepts
Crime: how to define it?
 ‘Acts of force or fraud undertaken in the
pursuit of self-interest' [Got90a].
‘Crimes are defined as acts or missions
forbidden by law that can be punished by
imprisonment and/or fine’ [Wil98]
[Got90a] M. R. Gottfredson and T. Hirschi. A General Theory of Crime. Stanford University Press,
1990. http://www.sup.org/book.cgi?id=2686.
[Wil98] J. Q. Wilson and R. J. Herrnstein. Crime & Human Nature: The Definitive Study of the Causes
of Crime. Free Press, Jan 1998.
13
Cyber-crime science
5. Determining how to measure:
‘operationalisation’
How are you going to measure crime?
Where, or from whom can you collect
information?
Any suggestions?
Remember basic lesson of statistics ‘garbage
in = garbage out’
14
Cyber-crime science
How to measure phishing?
1) Behavioral data: respondent
1. Accepted a ‘friend’ request from an unknown person
2. Provided the requested information
2) Self-report: the respondent’s likelihood of
1. Accepting the friend request (mean=3.10, s.d. = 1.36)
2. Accepting the information request (mean=2.79, s.d. = 0.97)
•
1-5 response scale, ranged from ‘Not at all likely’ to ‘Very
likely’
Question: which is to be preferred?
15
[Vis15] A. Vishwanath. Habitual Facebook use and its impact on getting deceived on social
media. J. of Computer-Mediated Communicatio, page to appear, 2015.
http://dx.doi.org/10.1111/jcc4.12100.
Cyber-crime science
How to measure phishing?
- 33 subjects accepted the level 1 request (total N=150)=22%
- 19 responded to the level 2 request = 13%
- the behavioural data correlated with the respective self-report measures
 During exit interviews
• Some subjects who accepted the friend-request indicated they had subsequently
unfriended the phisher
• Some others mentioned they were planning to do the same
• Few others were about to accept the request but were waiting for their friend(s) to first
accept the request
• Some subjects indicated that they were about to accept the second request but had not
gotten down to it
• A few subjects responded to the request but asked for clarification
 ‘Thus, the behavioral measures appeared to have limited validity and did not accurately
reflect the variance in individuals’ likelihood of responding to the phishing requests.’
16
Cyber-crime science
5. Determining how to measure: examples
Self-reports on offending

Truthful, do people remember?
Self-reports on victimization

Truthful, do people remember?
Police records

Information complete, how often are offenders
caught?
What else?
17
Cyber-crime science
Levels of measurement
Nominal: attributes of people/incidents

Sex, city, ethnic group, country of origin…
Ordinal: logical rank order

Levels of education, crime seriousness
Interval: distance can be determined exactly

IQ
Ratio: true zero point

Value of property loss, in €, blood alcohol, length
of incarceration
18
Cyber-crime science
Criteria – questions: go to clinic
 Reliability

Consistency or stability of your measures

Do people give same answers each time?

Even DNA measures are not always reliable [Rot10]
 Internal validity

Do they measure what they ought to?

Self report measure of crime, based on 1 question?
 External validity

19
Is experiment representative?
[Rot10] A. Roth. Database-driven investigations. Criminology & Public Policy, 9(2):421-428,
May 2010.
Cyber-crime
sciencehttp://dx.doi.org/10.1111/j.1745-9133.2010.00638.x.
Validity & Reliability
Which concepts are you interested in?
Your measures need to be

Valid: internal and external validity

Reliable
Units of analysis: on what population or
sample will you collect information
20
Cyber-crime science
6. Choosing a research design
Where all the building blocks/issues come
together
How can you study the relationship
between
21

Crime & unemployment

Laptop theft and building design
Cyber-crime science
Designs – questions: go to clinic
Cross-sectional
Longitudinal

Approximation of longitudinal design

Does longitudinal design solve causality
problem?
Experiments. Advantages
22

Causation

Policy evaluation, (medical) intervention
Cyber-crime science
Randomized Controlled Trials =
the GOLD standard
Pp Pp Pp Pp Pp Pp Pp Pp Pp
Experimental
group
23
Cyber-crime science
Control
group
Why is randomization necessary?
Self-selection:

Persons sort themselves out to situations
Creaming

In organizations: less problematic offenders get
lighter sanctions & get alternative sanctions
Answer = randomization process
24
21/07/2015
Cyber-crime science
Replication
Easy way to think about quality of a study is
Replication
25
Cyber-crime science
Conclusions
(Almost) no study is perfect
Therefore research is about reading & doing
the next study better/smarter than the
previous one
26
Cyber-crime science
That’s it
See you next time
###
27
Cyber-crime science