2016
DOI: 10.1080/07421222.2016.1205925
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Validation of Malicious Insider Characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 66 publications
0
15
0
Order By: Relevance
“…The second tactic calls for an identification through an antithesis approach, whereby the fear appeal urges employees to unite against a common enemy or threat. For example, an organization may release commentary containing passages that highlight threats from “outsiders” such as a “malicious” hacker (Liang, Biros, & Luse, ). A third tactic involves invoking a common ground between the individual and the organization by using a language of commonality.…”
Section: A Persuasive Rhetorical Strategy For Effective Fear Appeal Dmentioning
confidence: 99%
“…The second tactic calls for an identification through an antithesis approach, whereby the fear appeal urges employees to unite against a common enemy or threat. For example, an organization may release commentary containing passages that highlight threats from “outsiders” such as a “malicious” hacker (Liang, Biros, & Luse, ). A third tactic involves invoking a common ground between the individual and the organization by using a language of commonality.…”
Section: A Persuasive Rhetorical Strategy For Effective Fear Appeal Dmentioning
confidence: 99%
“…First, although the intentions of the perpetrators (i.e., betrayers) cannot be predicted because they vary greatly, they tend to provide communication cues of their intent (Ho, Hancock, & Booth, ). Second, insider betrayal tends to represent socio‐psychological behavioral problems that are fundamentally difficult to detect in advance (Liang, Biros, & Luse, ). The ability to obtain measures of a person's baseline behavior is important in efforts to predict future malfeasance (Debar et al, ).…”
Section: Inquiry Into Insider Threat Researchmentioning
confidence: 99%
“…With the rise of Twitter as one of the most archetypal social media platforms for user-generated content, researchers in IS and beyond have since relied on Twitter sentiments for inferring user beliefs and perception [36]. These studies have ranged from the use of microblogs on unidirectional platforms such as Twitter which leads to asymmetrical connections [55] to bidirectional platforms such as Facebook [54].…”
Section: Sentimentmentioning
confidence: 99%