Insider threat behavior factors: a comparison of theory with reported incidents
dc.contributor.author | Munshi, A. | |
dc.contributor.author | Dell, Peter | |
dc.contributor.author | Armstrong, Colin | |
dc.contributor.editor | Ralph H. Sprague, Jr. | |
dc.date.accessioned | 2017-01-30T14:06:41Z | |
dc.date.available | 2017-01-30T14:06:41Z | |
dc.date.created | 2012-04-22T20:00:40Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Munshi, Asmaa and Dell, Peter and Armstrong, Helen. 2012, Insider threat behaviour factors: A comparison of theory with reported incidents, in Sprague, R.H., Jr. (ed), Proceedings of the 2012 45th Hawaii International Conference on System Science (HICSS 2012), Jan 4-7 2012, pp. 2402-2411. Maui, Hawaii: Institute of Electrical and Electronics Engineers. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/37701 | |
dc.identifier.doi | 10.1109/HICSS.2012.326 | |
dc.description.abstract |
Almost all organizations and sectors are currently faced with the problem of insider threats to vital computer assets. Internal incidents can cause more than just financial losses; the costs can also include loss of clients and damage to an organization’s reputation. Substantial academic research investigating internal threats has been conducted. This paper examines a number of theoretical models drawn from academic literature to identify a set of factors that are thought to be behavior factors associated with insider threats. These factors are then critiqued using empirical evidence from reported incidents, resulting in insights into areas where the theoretical perspectives of academic literature are both supported and unsupported by actual case evidence. The paper concludes with recommendations for future research directions for academic researchers. | |
dc.publisher | The Institute of Electrial and Electronics Engineers, Inc | |
dc.subject | vital computer assets | |
dc.subject | insider threats | |
dc.subject | behavior factors | |
dc.title | Insider threat behavior factors: a comparison of theory with reported incidents | |
dc.type | Conference Paper | |
dcterms.source.startPage | 2402 | |
dcterms.source.endPage | 2411 | |
dcterms.source.title | Proceedings of the Forty-Fifth Annual Hawaii International Conference on System Sciences | |
dcterms.source.series | Proceedings of the Forty-Fifth Annual Hawaii International Conference on System Sciences | |
dcterms.source.isbn | 9780769545257 | |
dcterms.source.conference | The Forty-Fifth Annual Hawaii International Conference on System Sciences | |
dcterms.source.conference-start-date | Jan 4 2012 | |
dcterms.source.conferencelocation | Hawaii | |
dcterms.source.place | USA | |
curtin.department | School of Information Systems | |
curtin.accessStatus | Fulltext not available |