2012 45th Hawaii International Conference on System Sciences 2012
DOI: 10.1109/hicss.2012.326
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents

Abstract: Almost all organizations and sectors are currently faced with the problem of insider threats to vital computer assets. Internal incidents can cause more than just financial losses; the costs can also include loss of clients and damage to an organization's reputation.Substantial academic research investigating internal threats has been conducted. This paper examines a number of theoretical models drawn from academic literature to identify a set of factors that are thought to be behavior factors associated with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 32 publications
(55 reference statements)
0
8
0
1
Order By: Relevance
“…7 Motivated in part by known behavioral methods of assessing trustworthiness [Munshi et al 2012], we assume that both the project manager and her adversary know the distribution of a random variable representing the trustworthiness of each 7 The game was first introduced in a conference version of this research [Laszka et al 2013]. employee.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…7 Motivated in part by known behavioral methods of assessing trustworthiness [Munshi et al 2012], we assume that both the project manager and her adversary know the distribution of a random variable representing the trustworthiness of each 7 The game was first introduced in a conference version of this research [Laszka et al 2013]. employee.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…Politik motivasyonlar devlete veya kuruma zarar verme, terör yaratma, başka devlet veya şirket adına casusluk yapma gibi amaçları içerir. Kişisel motivasyonlar ise saldırganların şahsi hırsları, bilgi elde etme isteği veya hakkının yendiğini düşünüp intikam alma isteği gibi nedenlerdir [14]. İç saldırganın sahip olabileceği motivasyonlar Şekil 2'de gösterilmiştir.…”
Section: Kurum İçi Saldırının Unsurları Ve Veri Sızdırma Yöntemleri (Elements Of Insider Attacks and Data Leakage Methods)unclassified
“…These scenario-based detectors are then used in clustering algorithms to sort emails into classes (Young et al, 2014). According to various authors, there are three main types of insider threats, namely, insider it sabotage, insider intellectual property theft and insider fraud (Spooner et al, 2018;Claycomb et al, 2013;Cappelli et al, 2012;Munshi et al, 2012). Spooner et al (2018) used observable behaviours of the main insider threat types and studied various approaches to detect threats in organizations.…”
Section: Background and Related Workmentioning
confidence: 99%