An Empirical Comparison of Malicious Insiders and Benign Insiders

IF 2.5 4区 管理学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Nan Liang, David P. Biros, Andy Luse
{"title":"An Empirical Comparison of Malicious Insiders and Benign Insiders","authors":"Nan Liang, David P. Biros, Andy Luse","doi":"10.1080/08874417.2023.2251427","DOIUrl":null,"url":null,"abstract":"Malicious insiders continue to pose a significant threat to organizations. With their knowledge, privilege, and access to organizational resources, malicious insiders can attack the organization easier than outsiders, bypassing security measures. Current research about malicious insiders’ traits is often based on a limited number of cases and lacking empirical validation. With few exceptions, most research focuses on the effects of individual traits without investigation of their interactions. To identify the effects of these traits and their interactions, this study employs text mining to analyze 133 real-world malicious insider cases by comparing how the media portray malicious insiders to how the media portray benign insiders. This study sheds light on the predictive power of common traits of malicious insiders. Also, the interaction effects of some traits indicate that although they are not significant at the unary level, their co-occurrence differentiates malicious insiders with benign insiders as portrayed in the media.","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"45 1","pages":"0"},"PeriodicalIF":2.5000,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08874417.2023.2251427","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Malicious insiders continue to pose a significant threat to organizations. With their knowledge, privilege, and access to organizational resources, malicious insiders can attack the organization easier than outsiders, bypassing security measures. Current research about malicious insiders’ traits is often based on a limited number of cases and lacking empirical validation. With few exceptions, most research focuses on the effects of individual traits without investigation of their interactions. To identify the effects of these traits and their interactions, this study employs text mining to analyze 133 real-world malicious insider cases by comparing how the media portray malicious insiders to how the media portray benign insiders. This study sheds light on the predictive power of common traits of malicious insiders. Also, the interaction effects of some traits indicate that although they are not significant at the unary level, their co-occurrence differentiates malicious insiders with benign insiders as portrayed in the media.
恶意内部人员与良性内部人员的实证比较
恶意的内部人员继续对组织构成重大威胁。凭借他们的知识、特权和对组织资源的访问,恶意的内部人员可以比外部人员更容易地攻击组织,绕过安全措施。目前关于恶意内部人员特征的研究往往基于有限的案例,缺乏经验验证。除了少数例外,大多数研究都集中在个体特征的影响上,而没有调查它们之间的相互作用。为了确定这些特征及其相互作用的影响,本研究通过比较媒体如何描绘恶意内部人士和媒体如何描绘良性内部人士,采用文本挖掘来分析133个真实世界的恶意内部人士案例。这项研究揭示了恶意内部人员的共同特征的预测能力。此外,一些特征的相互作用效应表明,尽管它们在一元水平上并不显著,但它们的共存区分了媒体所描绘的恶意内部人员和良性内部人员。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Computer Information Systems
Journal of Computer Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
6.80
自引率
7.10%
发文量
82
审稿时长
>12 weeks
期刊介绍: The Journal of Computer Information Systems (JCIS) aims to publish manuscripts that explore information systems and technology research and thus develop computer information systems globally. We encourage manuscripts that cover the following topic areas: -Analytics, Business Intelligence, Decision Support Systems in Computer Information Systems - Mobile Technology, Mobile Applications - Human-Computer Interaction - Information and/or Technology Management, Organizational Behavior & Culture - Data Management, Data Mining, Database Design and Development - E-Commerce Technology and Issues in computer information systems - Computer systems enterprise architecture, enterprise resource planning - Ethical and Legal Issues of IT - Health Informatics - Information Assurance and Security--Cyber Security, Cyber Forensics - IT Project Management - Knowledge Management in computer information systems - Networks and/or Telecommunications - Systems Analysis, Design, and/or Implementation - Web Programming and Development - Curriculum Issues, Instructional Issues, Capstone Courses, Specialized Curriculum Accreditation - E-Learning Technologies, Analytics, Future
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信