Classification of malicious insiders and the association of the forms of attacks

Author:

Glancy Fletcher,Biros David P.,Liang Nan,Luse Andy

Abstract

Purpose The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack. Design/methodology/approach The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality. Findings The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks. Research limitations/implications This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue. Practical implications Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs. Social implications Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm. Originality/value This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.

Publisher

Emerald

Subject

Law,Applied Psychology,Social Psychology

Reference82 articles.

1. Diagnostic and Statistical Manual of Mental Disorders

2. Human aggression;Annual Review of Psychology,2002

3. Assessing the heterogeneity of aggressive behavior traits: exploratory and confirmatory analyses of the reactive and instrumental aggression personality assessment inventory (PAI) scales;Violence and Victims,2013

4. Band, S.R. Cappelli, D.M. Fischer, L.F. Moore, A.P. Shaw, E.D. and Trzeciak, R.F. (2006), “Comparing insider IT sabotage and espionage: a model-based analysis”, Software Engineering Institute, Carnegie Mellon University, available at: https://resources.sei.cmu.edu/asset_files/TechnicalReport/2006_005_001_14798.pdf (accessed 23 October 2019).

5. The insider attack problem nature and scope,2008

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Security and privacy concerns in smart healthcare system;Implementation of Smart Healthcare Systems using AI, IoT, and Blockchain;2023

2. Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks;Illumination of Artificial Intelligence in Cybersecurity and Forensics;2022

3. Towards protecting organisations’ data by preventing data theft by malicious insiders;International Journal of Organizational Analysis;2021-08-17

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3