2014 47th Hawaii International Conference on System Sciences 2014
DOI: 10.1109/hicss.2014.256
|View full text |Cite
|
Sign up to set email alerts
|

Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies

Abstract: Organizations often suffer harm from individuals who bear them no malice but whose actions unintentionally expose the organizations to risk in some way. This paper examines initial findings from research on such cases, referred to as unintentional insider threat (UIT). The goal of this paper is to inform government and industry stakeholders about the problem and its possible causes and mitigation strategies. As an initial approach to addressing the problem, we developed an operational definition for UIT, revie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(34 citation statements)
references
References 32 publications
(54 reference statements)
0
34
0
Order By: Relevance
“…The SE can then proceed to use this workstation as a pivot point for any further attacks on the organisation. This type of an attack is viable due to an unintentional insider threat [54,55].…”
Section: Indirect Communication -Templatementioning
confidence: 99%
“…The SE can then proceed to use this workstation as a pivot point for any further attacks on the organisation. This type of an attack is viable due to an unintentional insider threat [54,55].…”
Section: Indirect Communication -Templatementioning
confidence: 99%
“…Researchers have mentioned three types of non-compliance behaviour: malicious behaviour, negligent behaviour and unawareness. The main motivation for malicious behaviour is malicious intent to bring harm to an organization's information assets [11] [12], whereas negligent behaviour is intent to violate an organization's security policy but not to harm that organization [13]. The third type of non-complaint behaviour is due to unawareness, whereby end users are unaware of the importance of information security and the relevant organizational requirements.…”
Section: Non-compliance With Security Policymentioning
confidence: 99%
“…Khan et al's [14] research indicated that more than fifty percent of employees are unaware of the existence of an information security policy in their organisation. Moreover, Greitzer et al [13] state that users tend to dislike the active controls that are imposed on their PCs, and this can be seen in many organisations. The reason for users having an aversion to these controls is that they impose a group of no commands (e.g.…”
Section: Non-compliance With Security Policymentioning
confidence: 99%
“…This description is refined by Grietzer et al [18] Observed&cyber&behaviour& e.g.,%Disabling%security% soIware% Fig. 1.…”
Section: A Accidental Insider Casesmentioning
confidence: 99%