The Enemy Within the Insider: Detecting the Insider Threat Through Addiction Theory
Michele Maasberg and
Nicole L. Beebe
Journal of Information Privacy and Security, 2014, vol. 10, issue 2, 59-70
Abstract:
“Insiders” remain a significant threat to organizations—evidenced by recent cases involving Robert Hansen, Bradley Manning, and Edward Snowden—even in light of significant movement toward neutralizing the threat through detection and prevention. Insiders pose detection challenges for security professionals because they often have legitimate access and intimate organizational knowledge. Nonetheless, past insider threat detection research has predominantly focused on signature-based detection of digital indicators of insider activity and behavioral profiling. This article develops a novel relationship between addiction theory and the insider threat from an information systems perspective. This discussion introduces seven propositions concerning this relationship, addiction antecedents, and the factors moderating the relationship between addiction and the insider threat. This model has significant implications for the insider threat detection challenge, as it provides new signals that may be useful for detection, supporting practitioners, and future research.
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2014.924807 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:10:y:2014:i:2:p:59-70
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20
DOI: 10.1080/15536548.2014.924807
Access Statistics for this article
Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit
More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().