Luster Regained : A Novel Cyber Incident Risk Prediction Model Using Machine Learning

Authors

  • Meghna 'Chili' Pramoda  Baldwin School of Puerto Rico, Bayamon, PR, USA
  • Siona 'Dolly' Pramoda  Baldwin School of Puerto Rico, Bayamon, PR, USA
  • Zacha M. Ortiz Correa  Baldwin School of Puerto Rico, Bayamon, PR, USA

DOI:

https://doi.org//10.32628/CSEIT2283125

Keywords:

Cybersecurity, Cybersafety education, Ensemble risk model, Digital safety curriculum, Cyberbullying, Digital Risk Score Prediction

Abstract

Physical isolation during the COVID-19 pandemic prompted a 45% increase in digital use [5,15], leading to an increase in cyber incidents. This project seeks to understand the risk impact of prolonged internet use and evaluate opportunities for cyber education to lower such risk. In preparation for subsequent work, the project will learn about patterns in distress and the recovery of affected individuals. A 20-question English-language survey (Appendix A) was completed by 6th through 12th graders (n=1,869) across 4 countries. Analysis of the survey [1, 8, 10, 11, 13] indicated that the number of hours of internet use was a driver of the risk of cyber incidents. In addition to statistical analysis, the methodology used Google’s VertexAI AutoML [6] to generate an ensemble model to predict risk (on n=1 basis) from usage patterns (length of usage, gaming use, etc.). The cyber risk predictor model set has high overall accuracy (f1 score of 0.88) and precision and recall of 0.878. This low-cost approach to personalized risk scores could support periodic evaluation and trending of educational effectiveness in cyber safety. Separately, participants reported a strong association (Spearman’s Rho = 0.957) between distress from cyber incidents and recovery time. Among the respondents with high distress experiences, there is an urgent need to design support programs to help them cope.

References

  1. 11 facts about cyberbullying. (n.d.). DoSomething.Org. https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying (Accessed February 12, 2022).
  2. CDC. (2019). #StopBullying. Centers for Disease Control and Prevention. https://www.cdc.gov/injury/features/stop-bullying/index.html (Accessed December 29, 2021).
  3. Collaborative R&D – DQ institute. (n.d.). Retrieved February 23, 2022, from https://www.dqinstitute.org/collaborative-rd/#st
  4. Cross et al. (2015). Longitudinal impact of the Cyber Friendly Schools program on adolescents’ cyberbullying behavior. Wiley Online Library. https://onlinelibrary.wiley.com/doi/abs/10.1002/ab.21609 (Accessed October 3, 2021).
  5. Enough is enough: Internet safety. (n.d.). Enough.Org. Retrieved February 12, 2022, from https://enough.org/stats_internet_safety
  6. Google’s Vertex AI software for machine learning model building and evaluation. https://cloud.google.com/vertex-ai (Accessed February 20, 2022).
  7. JASP open-source software for statistical analysis. https://jasp-stats.org/ v0.16.1(Accessed February 20, 2022).
  8. Kemp, S. (2021, January 27). Digital 2021: Global overview report — datareportal – global digital insights. DataReportal – Global Digital Insights. https://datareportal.com/reports/digital-2021-global-overview-report (Accessed September 29, 2021).
  9. Patchin, B. J. W. (2019, July 9). 2019 cyberbullying data. Cyberbullying Research Center. https://cyberbullying.org/2019-cyberbullying-data (Accessed September 17, 2021).
  10. Patchin, J. W., & Hinduja, S. (2020, December 18). Tween statistics (9- to 12-year-olds). Cyberbullying Research Center. https://cyberbullying.org/tween-statistics (Accessed September 14, 2021).
  11.  Przybylski, A. K., & Nash, V. (2018). Internet filtering and adolescent exposure to online sexual material. Cyberpsychology, Behavior and Social Networking, 21(7), 405–410. https://doi.org/10.1089/cyber.2017.0466 (Accessed October 11, 2021).
  12. Spina, G., Bozzola, E., Ferrara, P., Zamperini, N., Marino, F., Caruso, C., Antilici, L., & Villani, A. (2021). Children and adolescent’s perception of media device use consequences. International Journal of Environmental Research and Public Health, 18(6). https://doi.org/10.3390/ijerph18063048 (Accessed October 3, 2021).
  13. Thorn & Benenson Strategy Group. (2021, May). Responding to Online Threats: Minors’ Perspectives on Disclosing, Reporting, and Blocking - Findings from 2020 quantitative research among 9–17 year olds. Thorn.Org. https://info.thorn.org/hubfs/Research/Responding%20to%20Online%20Threats_2021-Full-Report.pdf (Accessed October 26, 2021).
  14. Vakhitova, Z. I., Alston-Knox, C. L., Reeves, E., & Mawby, R. I. (2021). Explaining victim impact from cyber abuse: An exploratory mixed methods analysis. Deviant Behavior, 1–20. https://doi.org/10.1080/01639625.2021.1921558 (Accessed October 3, 2021).
  15. Watson, A. (2020, June 18). Media usage during COVID-19 by country. Statista. https://www.statista.com/statistics/1106498/home-media-consumption-coronavirus-worldwide-by-country/ (Accessed February 21, 2022).
  16. Take control of your content with ReadablePro. (2018, January 18). Readable. https://readable.com/ (Accessed November 23, 2021).

Downloads

Published

2022-07-05

Issue

Section

Research Articles

How to Cite

[1]
Meghna 'Chili' Pramoda, Siona 'Dolly' Pramoda, Zacha M. Ortiz Correa, " Luster Regained : A Novel Cyber Incident Risk Prediction Model Using Machine Learning, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 4, pp.01-19, July-August-2022. Available at doi : https://doi.org/10.32628/CSEIT2283125