Skip to main content
Erschienen in: Information Systems Frontiers 1/2013

01.03.2013

Understanding insiders: An analysis of risk-taking behavior

verfasst von: Fariborz Farahmand, Eugene H. Spafford

Erschienen in: Information Systems Frontiers | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There is considerable research being conducted on insider threats directed to developing new technologies. At the same time, existing technology is not being fully utilized because of non-technological issues that pertain to economics and the human dimension. Issues related to how insiders actually behave are critical to ensuring that the best technologies are meeting their intended purpose. In our research, we have investigated accepted models of perceptions of risk and characteristics unique to insider threat, and we have introduced ordinal scales to these models to measure insider perceptions of risk. We have also investigated decision theories, leading to a conclusion that prospect theory, developed by Tversky and Kahneman, may be used to describe the risk-taking behavior of insiders and can be accommodated in our model. Our results indicate that there is an inverse relationship between perceived risk and benefit by insiders and that their behavior cannot be explained well by the models that are based on the traditional methods of engineering risk analysis and expected utility. We discuss the results of validating that model with forty-two senior information security executives from a variety of organizations. We also discuss how the model may be used to identify characteristics of insiders’ perceptions of risk and benefit, their risk-taking behavior and how to frame insider decisions. Finally, we recommend understanding risk of detection and creating a fair working environment to reduce the likelihood of committing criminal acts by insiders.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Albrechtsen, E., & Hovden, J. (2009). Improving information security awareness and behavior through dialogue, participation and collective reflection. An intervention study. Computers & Security, XXX, 1–14. Albrechtsen, E., & Hovden, J. (2009). Improving information security awareness and behavior through dialogue, participation and collective reflection. An intervention study. Computers & Security, XXX, 1–14.
Zurück zum Zitat Bishop, M., & Gates, C. (2008). Defining the insider threat. Proceedings of the Cyber Security and Information Intelligence Research Workshop, article 15. Bishop, M., & Gates, C. (2008). Defining the insider threat. Proceedings of the Cyber Security and Information Intelligence Research Workshop, article 15.
Zurück zum Zitat Bloom, B. S., & Krathwohl, D. R. (1956). Taxonomy of educational objectives: The classification of educational goals, by a committee of college and university examiners. Handbook 1: Cognitive domain, New York, Longmans. Bloom, B. S., & Krathwohl, D. R. (1956). Taxonomy of educational objectives: The classification of educational goals, by a committee of college and university examiners. Handbook 1: Cognitive domain, New York, Longmans.
Zurück zum Zitat Brackney, R. C., & Anderson, R. H. (2004). Understanding the Insider Threat. Proceedings of a March 2004 Workshop, RAND Corporation. Brackney, R. C., & Anderson, R. H. (2004). Understanding the Insider Threat. Proceedings of a March 2004 Workshop, RAND Corporation.
Zurück zum Zitat Camerer, C. F. (2000). Prospect theory in the wild. In D. Kahnman & A. Tversky (Eds.), Choices, values, and frames (p. Chap. 16). Cambridge: Cambridge University Press. Camerer, C. F. (2000). Prospect theory in the wild. In D. Kahnman & A. Tversky (Eds.), Choices, values, and frames (p. Chap. 16). Cambridge: Cambridge University Press.
Zurück zum Zitat Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26, 63–72.CrossRef Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. Computers & Security, 26, 63–72.CrossRef
Zurück zum Zitat D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef
Zurück zum Zitat Deloitte (2009). Protecting what matters: The 6th annual global security survey. Deloitte Touche Tohmatsu. Deloitte (2009). Protecting what matters: The 6th annual global security survey. Deloitte Touche Tohmatsu.
Zurück zum Zitat DeMillo, R. A., & Spafford, E. H. (2004). Four grand challenges in trustworthy computing. Computing Research Association, 2004. DeMillo, R. A., & Spafford, E. H. (2004). Four grand challenges in trustworthy computing. Computing Research Association, 2004.
Zurück zum Zitat Diamond, L. (1988). The impact of information form on the perception of risk. International Conference on Information Systems, 91–97. Diamond, L. (1988). The impact of information form on the perception of risk. International Conference on Information Systems, 91–97.
Zurück zum Zitat Dillon, R. L., & Tinsley, C. H. (2008). How near-misses influence decision making under risk: a missed opportunity for learning. Management Science, 54(8), 1425–1440.CrossRef Dillon, R. L., & Tinsley, C. H. (2008). How near-misses influence decision making under risk: a missed opportunity for learning. Management Science, 54(8), 1425–1440.CrossRef
Zurück zum Zitat Farahmand, F., Atallah, M., & Kensynski, B. (2008). Incentives and Perceptions of Information Security Risks. Proc. of the Twenty Ninth International Conference on Information Systems, Paris. Farahmand, F., Atallah, M., & Kensynski, B. (2008). Incentives and Perceptions of Information Security Risks. Proc. of the Twenty Ninth International Conference on Information Systems, Paris.
Zurück zum Zitat Finucane, M. L., Alhakami, A., Slovic, P., & Johnson, S. M. (2000). The affect heuristic in judgments of risks and benefits. Journal of Behavioral Decision Making, 13, 1–17.CrossRef Finucane, M. L., Alhakami, A., Slovic, P., & Johnson, S. M. (2000). The affect heuristic in judgments of risks and benefits. Journal of Behavioral Decision Making, 13, 1–17.CrossRef
Zurück zum Zitat Fischoff, B., et al. (1978). How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits? Policy Sciences, 9(2), 127–152.CrossRef Fischoff, B., et al. (1978). How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits? Policy Sciences, 9(2), 127–152.CrossRef
Zurück zum Zitat Gefen, D. P., & Pavlou, P. A. (2006). The modeling role of perceived regulatory effectiveness of the online marketplaces on the role of trust and risk transaction intensions. WI: International Conference on Information Systems. Gefen, D. P., & Pavlou, P. A. (2006). The modeling role of perceived regulatory effectiveness of the online marketplaces on the role of trust and risk transaction intensions. WI: International Conference on Information Systems.
Zurück zum Zitat Goodhue, D. L., & Straub, D. W. (1991). Security concerns of systems users; a study of perceptions of the adequacy of security. Information & Management, 20, 13–27.CrossRef Goodhue, D. L., & Straub, D. W. (1991). Security concerns of systems users; a study of perceptions of the adequacy of security. Information & Management, 20, 13–27.CrossRef
Zurück zum Zitat Greitzer, F. L., et al. (2008). Combating the insider cyber threat. IEEE Security and Privacy, 61–64. Greitzer, F. L., et al. (2008). Combating the insider cyber threat. IEEE Security and Privacy, 61–64.
Zurück zum Zitat Hammond, K. R. (1993). Naturalistic decision making from a Brunswikian viewpoint: Its past, present, future. In G. A. Klein, J. Orasanu, R. Calanrewood, & E. Zsambok (Eds.), Decision making in action: Models and methods (pp. 205–227). Norwood: Albex. Hammond, K. R. (1993). Naturalistic decision making from a Brunswikian viewpoint: Its past, present, future. In G. A. Klein, J. Orasanu, R. Calanrewood, & E. Zsambok (Eds.), Decision making in action: Models and methods (pp. 205–227). Norwood: Albex.
Zurück zum Zitat Heath, L., et al. (1994). Applications of Heuristics and biases to social issues. Plenum. Heath, L., et al. (1994). Applications of Heuristics and biases to social issues. Plenum.
Zurück zum Zitat Hu, X., Lin, Z., Whinston, A., & Zang, H. (2001). Perceived risk and escrow adoption. International Conference on Information Systems (pp 271–274). Hu, X., Lin, Z., Whinston, A., & Zang, H. (2001). Perceived risk and escrow adoption. International Conference on Information Systems (pp 271–274).
Zurück zum Zitat Jennex, M. E., & Zyngier, S. (2007). Security as a contributor to knowledge management success. Information Systems Frontiers, 9, 493–504.CrossRef Jennex, M. E., & Zyngier, S. (2007). Security as a contributor to knowledge management success. Information Systems Frontiers, 9, 493–504.CrossRef
Zurück zum Zitat Johnson, E. J., & Tversky, A. (1984). Representations of perceptions of risk. Journal of Experimental Psycholog: General, 113, 55–70.CrossRef Johnson, E. J., & Tversky, A. (1984). Representations of perceptions of risk. Journal of Experimental Psycholog: General, 113, 55–70.CrossRef
Zurück zum Zitat Kahneman, D., & Lovallo, D. (1993). Timid choices and bold forecasts: a cognitive perspective on risk taking. Management Science, 39(1), 17–31.CrossRef Kahneman, D., & Lovallo, D. (1993). Timid choices and bold forecasts: a cognitive perspective on risk taking. Management Science, 39(1), 17–31.CrossRef
Zurück zum Zitat Kahneman, D., Slovic, P., & Tversky, A. (1982). Judgment under uncertainty; Heuristics and biases. Cambridge University press. Kahneman, D., Slovic, P., & Tversky, A. (1982). Judgment under uncertainty; Heuristics and biases. Cambridge University press.
Zurück zum Zitat Kenney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives: Preferences and value tradeoffs. Wiley. Kenney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives: Preferences and value tradeoffs. Wiley.
Zurück zum Zitat Kim, K., & Prabhakar, P. (2000). Initial trust, perceived risk, and the adoption of the internet banking. International Conference on Information Systems (pp 537–543). Kim, K., & Prabhakar, P. (2000). Initial trust, perceived risk, and the adoption of the internet banking. International Conference on Information Systems (pp 537–543).
Zurück zum Zitat Knight, F. H. (1921). Risk, uncertainty and profit. Dodo. Knight, F. H. (1921). Risk, uncertainty and profit. Dodo.
Zurück zum Zitat Lehto, M. R., & Buck, J. R. (2008). Introduction to human factors and ergonomics for engineers. CRC. Lehto, M. R., & Buck, J. R. (2008). Introduction to human factors and ergonomics for engineers. CRC.
Zurück zum Zitat Levy, M., & Levy, H. (2002). Prospect theory: much ado about nothing. Management Science, 48(10), 1334–1349.CrossRef Levy, M., & Levy, H. (2002). Prospect theory: much ado about nothing. Management Science, 48(10), 1334–1349.CrossRef
Zurück zum Zitat Lichtenstein, S., & Slovic, P. (1971). Reversals of preference between bids and choices in gamble decisions. Journal of Experimental Psychology, 89(1), 46–55.CrossRef Lichtenstein, S., & Slovic, P. (1971). Reversals of preference between bids and choices in gamble decisions. Journal of Experimental Psychology, 89(1), 46–55.CrossRef
Zurück zum Zitat MacGregor, D. G., et al. (1999). Perception of financial risk: a survey study of advisors and planners. Journal of Financial Planning, 12(8), 68–86. MacGregor, D. G., et al. (1999). Perception of financial risk: a survey study of advisors and planners. Journal of Financial Planning, 12(8), 68–86.
Zurück zum Zitat Maloof, M. A., & Stephens, G. D. (2007). ELICIT: a system for detecting insiders who violate need-to-know. Lecture Notes in Computer Science, 4637, 146–166.CrossRef Maloof, M. A., & Stephens, G. D. (2007). ELICIT: a system for detecting insiders who violate need-to-know. Lecture Notes in Computer Science, 4637, 146–166.CrossRef
Zurück zum Zitat Masterson, S. S., et al. (2000). Integrating justice and social exchange: the differing effects of fair procedures and treatment on work relationships. Academy of Management Journal, 43(4), 738–748.CrossRef Masterson, S. S., et al. (2000). Integrating justice and social exchange: the differing effects of fair procedures and treatment on work relationships. Academy of Management Journal, 43(4), 738–748.CrossRef
Zurück zum Zitat Moores, T. T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communication of ACM, 46(12), 265–271.CrossRef Moores, T. T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communication of ACM, 46(12), 265–271.CrossRef
Zurück zum Zitat Odean, T. (1998). Are investors reluctant to realize their losses? Journal of Finance, 53, 1775–1798.CrossRef Odean, T. (1998). Are investors reluctant to realize their losses? Journal of Finance, 53, 1775–1798.CrossRef
Zurück zum Zitat Paese, P. W., Bieser, M., & Tubbs, M. E. (1993). Framing effects and choose shifts in group decision making. Organizational Behavior and Human Decision Processes, 56, 149–165.CrossRef Paese, P. W., Bieser, M., & Tubbs, M. E. (1993). Framing effects and choose shifts in group decision making. Organizational Behavior and Human Decision Processes, 56, 149–165.CrossRef
Zurück zum Zitat Savage, L. J. (1954). The foundations of statistics. Wiley. Savage, L. J. (1954). The foundations of statistics. Wiley.
Zurück zum Zitat Schroeder, N. J. (2005). Using prospect theory to investigate decision-making bias within an information security context. Dept. of the Air Force Air University, Air Force Institute of Technology. Schroeder, N. J. (2005). Using prospect theory to investigate decision-making bias within an information security context. Dept. of the Air Force Air University, Air Force Institute of Technology.
Zurück zum Zitat Slovic, P., et al. (2007). The affect heuristic. European Journal of Operational Research, 177, 1333–1352.CrossRef Slovic, P., et al. (2007). The affect heuristic. European Journal of Operational Research, 177, 1333–1352.CrossRef
Zurück zum Zitat Stamper, C. L., & Masteson, S. (2002). Insider or outsider? How employee perception of insider status affect their work behavior. Journal of Organizational Behavior, 23, 875–894.CrossRef Stamper, C. L., & Masteson, S. (2002). Insider or outsider? How employee perception of insider status affect their work behavior. Journal of Organizational Behavior, 23, 875–894.CrossRef
Zurück zum Zitat Starr, C. (1969). Social benefits versus technological risks. Science, 165(3899), 1232–1238.CrossRef Starr, C. (1969). Social benefits versus technological risks. Science, 165(3899), 1232–1238.CrossRef
Zurück zum Zitat Stolfo, S. J., et al. (2008). Insider attack and cyber security, advances in information security. Springer. Stolfo, S. J., et al. (2008). Insider attack and cyber security, advances in information security. Springer.
Zurück zum Zitat Stonebruner, G., Gougen, A., & Feringa, A. (2002). Risk management guide for information technology systems. NIST SP800-30. Stonebruner, G., Gougen, A., & Feringa, A. (2002). Risk management guide for information technology systems. NIST SP800-30.
Zurück zum Zitat Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22(4), 441–469.CrossRef Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22(4), 441–469.CrossRef
Zurück zum Zitat Sveen, F. O., Rich, E., & Jager, M. (2007). Overcoming organizational challenges to secure knowledge management. Information Systems Frontiers, 9, 481–492.CrossRef Sveen, F. O., Rich, E., & Jager, M. (2007). Overcoming organizational challenges to secure knowledge management. Information Systems Frontiers, 9, 481–492.CrossRef
Zurück zum Zitat Taylor, R. G. (2006). Management perception of unintentional information security risks. International Conference on Information Systems (pp 1581–1597). Taylor, R. G. (2006). Management perception of unintentional information security risks. International Conference on Information Systems (pp 1581–1597).
Zurück zum Zitat Trepel, C., Fox, C. R., & Poldrack, R. A. (2005). Prospect theory on the brain? Toward a cognitive neuroscience of decision under risk. Cognitive Brain Research, 23(1), 34–50.CrossRef Trepel, C., Fox, C. R., & Poldrack, R. A. (2005). Prospect theory on the brain? Toward a cognitive neuroscience of decision under risk. Cognitive Brain Research, 23(1), 34–50.CrossRef
Zurück zum Zitat Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: heuristics and biases. Science, 185, 1124–1131.CrossRef Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: heuristics and biases. Science, 185, 1124–1131.CrossRef
Zurück zum Zitat Tversky, A., & Kahneman, D. (1979). Prospect theory: an analysis of decisions under risk. Econometrica, 47(2), 263–291.CrossRef Tversky, A., & Kahneman, D. (1979). Prospect theory: an analysis of decisions under risk. Econometrica, 47(2), 263–291.CrossRef
Zurück zum Zitat von Neumann, J., & Morgenstern, O. (1947). Theory of games and economic behavior. Princeton University Press. von Neumann, J., & Morgenstern, O. (1947). Theory of games and economic behavior. Princeton University Press.
Zurück zum Zitat Wells, J. T. (2005). Principles of fraud examination. Wiley. Wells, J. T. (2005). Principles of fraud examination. Wiley.
Zurück zum Zitat Willison, R., & Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133–137.CrossRef Willison, R., & Siponen, M. (2009). Overcoming the insider: reducing employee computer crime through situational crime prevention. Communications of the ACM, 52(9), 133–137.CrossRef
Zurück zum Zitat Wood, B. (2000). An insider threat model for adversary simulation. SRI International, Research on Mitigating the Insider Threat to Information Systems—#2 Proceedings of a Workshop Held by RAND. Wood, B. (2000). An insider threat model for adversary simulation. SRI International, Research on Mitigating the Insider Threat to Information Systems—#2 Proceedings of a Workshop Held by RAND.
Zurück zum Zitat Zajonc, R. B. (1980). Feeling and thinking: preferences need no inferences. American Psychologist, 35, 151–175.CrossRef Zajonc, R. B. (1980). Feeling and thinking: preferences need no inferences. American Psychologist, 35, 151–175.CrossRef
Metadaten
Titel
Understanding insiders: An analysis of risk-taking behavior
verfasst von
Fariborz Farahmand
Eugene H. Spafford
Publikationsdatum
01.03.2013
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 1/2013
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-010-9265-x

Weitere Artikel der Ausgabe 1/2013

Information Systems Frontiers 1/2013 Zur Ausgabe