Inside the Insider

被引:3
|
作者
Sanders G.L. [1 ]
Upadhyaya S. [2 ]
Wang X. [1 ]
机构
[1] Department of Management Science and Systems, University at Buffalo, State University of New York, Buffalo, 14260, NY
[2] Department of Computer Science and Engineering, Research and Graduate Education, School of Engineering and Applied Sciences, Center of Excellence in Information Systems Assurance Research and Education, University at Buffalo, State University of New York,
来源
IEEE Engineering Management Review | 1600年 / 47卷 / 02期
基金
美国国家科学基金会;
关键词
D O I
10.1109/EMR.2019.2917656
中图分类号
学科分类号
摘要
We present an overview of two major research projects on the role of monetary incentives and psychological traits in attracting individuals to hacking behavior. In the first study, scenarios were developed for five situations to determine if monetary incentives could be used to influence subjects to obtain healthcare information and to release that information. Approximately 35% to 46% of the 523 survey participants indicated that there is a price, ranging from $1,000 to over $10 million, acceptable for violating HIPAA laws. In the second study, 439 subjects completed a survey that identified the psychological traits that contribute to an individual's propensity to participate in White Hat, Grey Hat, or Black Hat hacking. Preliminary results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Gray Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension, and White Hatters, the good guys, tend to be Narcissists. Our focus on both studies is malicious insider attacks because insiders have the ability to do substantial monetary and reputational damage to the organization. Several suggestions have been made on addressing insider threats. © 1973-2011 IEEE.
引用
收藏
页码:84 / 91
页数:7
相关论文
共 50 条
  • [1] Inside the insider
    不详
    [J]. FORBES, 1996, 158 (01): : 12 - 12
  • [2] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
  • [3] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Clark, Jason
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2637 - 2637
  • [4] Introduction to Inside the Insider Threat Minitrack
    Clark, Jason W.
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3200 - 3201
  • [5] Introduction to the inside the insider threat Minitrack
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    [J]. Proceedings of the Annual Hawaii International Conference on System Sciences, 2016, 2016-March
  • [6] The View From the Inside: Positionality and Insider Research
    Berkovic, Danielle
    Ayton, Darshini
    Briggs, Andrew M.
    Ackerman, Ilana N.
    [J]. INTERNATIONAL JOURNAL OF QUALITATIVE METHODS, 2020, 19
  • [7] Inside and outside The Insider:: A film workshop in practical ethics
    van Es, R
    [J]. JOURNAL OF BUSINESS ETHICS, 2003, 48 (01) : 89 - 97
  • [8] INSIDE-OUTSIDER, OUTSIDE-INSIDER - COMMENT
    GUPTA, D
    [J]. TDR-THE DRAMA REVIEW-A JOURNAL OF PERFORMANCE STUDIES, 1993, 37 (04): : 12 - 13
  • [9] Inside and Outside The Insider: A Film Workshop in Practical Ethics
    Robert van Es
    [J]. Journal of Business Ethics, 2003, 48 : 89 - 97
  • [10] Conceptualizing from the Inside: Advantages, Complications, and Demands on Insider Positionality
    Chavez, Christina
    [J]. QUALITATIVE REPORT, 2008, 13 (03) : 474 - 494