skip to main content
10.1145/2978178.2978185acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat

Published:28 September 2016Publication History

ABSTRACT

Insider threats remain a significant problem within organizations, especially as industries that rely on technology continue to grow. Traditionally, research has been focused on the malicious insider; someone that intentionally seeks to perform a malicious act against the organization that trusts him or her. While this research is important, more commonly organizations are the victims of non-malicious insiders. These are trusted employees that are not seeking to cause harm to their employer; rather, they misuse systems-either intentional or unintentionally-that results in some harm to the organization. In this paper, we look at both by developing and validating instruments to measure the behavior and circumstances of a malicious insider versus a non-malicious insider. We found that in many respects their psychological profiles are very similar. The results are also consistent with other research on the malicious insider from a personality standpoint. We expand this and also find that trait negative affect, both its higher order dimension and the lower order dimensions, are highly correlated with insider threat behavior and circumstances. This paper makes four significant contributions: 1) Development and validation of survey instruments designed to measure the insider threat; 2) Comparison of the malicious insider with the non-malicious insider; 3) Inclusion of trait affect as part of the psychological profile of an insider; 4) Inclusion of a measure for financial well-being, and 5) The successful use of survey research to examine the insider threat problem.

References

  1. M. Maasberg, J. Warren, and N. L. Beebe, "The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits," in System Sciences (HICSS), 2015 48th Hawaii International Conference on, 2015, pp. 3518--3526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Grebitus, J. L. Lusk, and R. M. Nayga, "Explaining differences in real and hypothetical experimental auctions and choice experiments with personality," J. Econ. Psychol., vol. 36, pp. 11--26, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  3. F. L. Greitzer, L. J. Kangas, C. F. Noonan, A. C. Dalton, and R. E. Hohimer, "Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats," in System Science (HICSS), 2012 45th Hawaii International Conference on, 2012, pp. 2392--2401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Colwill, "Human factors in information security: The insider threat" Who can you trust these days?, Inf. Secur. Tech. Rep., vol. 14, no. 4, pp. 186--196, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. V. Benet-Martínez and O. P. John, "Los Cinco Grandes across cultures and ethnic groups: Multitrait-multimethod analyses of the Big Five in Spanish and English.," J. Pers. Soc. Psychol., vol. 75, no. 3, p. 729, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  6. O. P. John, E. M. Donahue, and R. L. Kentle, "The big five inventory-versions 4a and 54," Berkeley Univ. Calif. Berkeley Inst. Personal. Soc. Res., 1991.Google ScholarGoogle Scholar
  7. O. P. John, L. P. Naumann, and C. J. Soto, "Paradigm shift to the integrative big five trait taxonomy," Handb. Personal. Theory Res., vol. 3, pp. 114--158, 2008.Google ScholarGoogle Scholar
  8. J. D'Arcy, A. Hovav, and D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Info Sys Res., vol. 20, no. 1, pp. 79--98, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Voors, T. Turley, A. Kontoleon, E. Bulte, and J. A. List, "Exploring whether behavior in context-free experiments is predictive of behavior in the field: Evidence from lab and field experiments in rural Sierra Leone," Econ. Lett., vol. 114, no. 3, pp. 308--311, Mar. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. D. F. Grös, M. M. Antony, L. J. Simms, and R. E. McCabe, "Psychometric properties of the State-Trait Inventory for Cognitive and Somatic Anxiety (STICSA): Comparison to the State-Trait Anxiety Inventory (STAI).," Psychol. Assess., vol. 19, no. 4, pp. 369--381, Dec. 2007.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. Watson, L. A. Clark, and A. Tellegen, "Development and Validation of Brief Measures of Positive and Negative Affect: The PANAS Scales," J. Pers. Soc. Psychol., vol. 54, no. 6, pp. 1063--1070, Jun. 1988.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Watson and L. Walker, "The long-term stability and predictive validity of trait measures of affect.," J. Pers. Soc. Psychol., vol. 70, no. 3, pp. 567--77, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Brown, K. Taylor, and S. Wheatley Price, "Debt and distress: Evaluating the psychological cost of credit," J. Econ. Psychol., vol. 26, no. 5, pp. 642--663, Oct. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  14. L. Wang, W. Lu, and N. K. Malhotra, "Demographics, attitude, personality and credit card features correlate with credit card debt: A view from China," J. Econ. Psychol., vol. 32, no. 1, pp. 179--193, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  15. A. D. Prawitz, E. T. Garman, B. Sorhaindo, B. O'Neill, J. Kim, and P. Drentea, "InCharge financial distress/financial well-being scale: Development, administration, and score interpretation," J. Financ. Couns. Plan., vol. 17, no. 1, 2006.Google ScholarGoogle Scholar
  16. M. Theoharidou, S. Kokolakis, M. Karyda, and E. Kiountouzis, "The insider threat to information systems and the effectiveness of ISO17799," Comput. Secur., vol. 24, no. 6, pp. 472--484, Sep. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. L. Greitzer and D. A. Frincke, "Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation," in Insider Threats in Cyber Security, Springer, 2010, pp. 85--113.Google ScholarGoogle Scholar
  18. M. Dupuis, B. Endicott-Popovsky, and R. Crossler, "An Analysis of the Use of Amazon's Mechanical Turk for Survey Research in the Cloud," presented at the International Conference on Cloud Security Management, Seattle, Washington, 2013.Google ScholarGoogle Scholar
  19. G. A. Churchill, "A paradigm for developing better measures of marketing constructs.," J. Mark. Res., vol. 16, no. 1, pp. 64--73, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  20. D. W. Straub, "Validating Instruments in MIS Research.," MIS Q., vol. 13, no. 2, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Duffield, "The Delphi Technique," Aust. J. Adv. Nurs. Q. Publ. R. Aust. Nurs. Fed., vol. 6, no. 2, 1988.Google ScholarGoogle Scholar
  22. F. Hasson, S. Keeney, and H. McKenna, "Research Guidelines for the Delphi Survey Technique," J. Adv. Nurs., vol. 32, no. 4, pp. 1008--1015, 2000.Google ScholarGoogle Scholar
  23. D. Krathwohl, Methods of educational and social science research?: an integrated approach, 2nd ed. Long Grove Ill.: Waveland Press, 2004.Google ScholarGoogle Scholar
  24. P. Housen, "What the Resident Meant to Say: Use of Cognitive Interviewing Techniques to Develop Questionnaires for Nursing Home Residents," Gerontologist, vol. 48, no. 2, pp. 158--169, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  25. M. Rosal, E. Carbone, and K. V. Goins, "Use of cognitive interviewing to adapt measurement instruments for low-literate Hispanics.," Diabetes Educ., vol. 29, no. 6, 2003.Google ScholarGoogle Scholar
  26. D. Watson and L. A. Clark, "The PANAS-X: Manual for the Positive and Negative Affect Schedule - Expanded Form." University of Iowa, 1994.Google ScholarGoogle Scholar

Index Terms

  1. Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          RIIT '16: Proceedings of the 5th Annual Conference on Research in Information Technology
          September 2016
          66 pages
          ISBN:9781450344531
          DOI:10.1145/2978178

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 September 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          RIIT '16 Paper Acceptance Rate9of20submissions,45%Overall Acceptance Rate51of116submissions,44%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader