dc.contributor.author | Browne, Sean | |
dc.contributor.author | Lang, Michael | |
dc.contributor.author | Golden, William | |
dc.date.accessioned | 2018-10-12T08:30:26Z | |
dc.date.available | 2018-10-12T08:30:26Z | |
dc.date.issued | 2015-05-29 | |
dc.identifier.citation | Browne, Sean, Lang, Michael, & Golden, William. (2015). The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent". Paper presented at the Twenty-Third European Conference on Information Systems (ECIS), Münster, Germany, 29 May. | en_IE |
dc.identifier.uri | http://hdl.handle.net/10379/14601 | |
dc.description.abstract | A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external breaches but the greatest danger to an organisation lurks within. Whatever the
motivation, the trusted agent inside the organisation has the potential to do more damage than an
anonymous outsider and it is by increasing our understanding of this threat that we will get greater
value for our defence efforts. While acknowledging that a significant number of security incidents are
attributable to employees, it is important to remember in an organisational context, that simply
increasing security controls and sanctions has previously been shown to be counterproductive.
Therefore this research-in-progress takes the approach of increasing our understanding of how such
offenders think, through a synthesis of Rational Choice Theory, Deterrence Theory, Neutralisation
Theory and elements from Criminological Theory. In deliberately prioritising problems that are
important in practice and basing our measures on these priorities we will improve on the contextual
relevance of previous studies in this area, thereby making a solid contribution to the field. | en_IE |
dc.format | application/pdf | en_IE |
dc.language.iso | en | en_IE |
dc.publisher | AIS Electronic Library (AISeL) | en_IE |
dc.relation.ispartof | 23rd European Conference on Information Systems (ECIS) | en |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Ireland | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/3.0/ie/ | |
dc.subject | Cybercrime | en_IE |
dc.subject | Computer Abuse | en_IE |
dc.subject | Insider Abuse | en_IE |
dc.title | The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent" | en_IE |
dc.type | Conference Paper | en_IE |
dc.date.updated | 2018-10-06T11:15:57Z | |
dc.local.publishedsource | https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1004&context=ecis2015_rip | en_IE |
dc.description.peer-reviewed | peer-reviewed | |
dc.internal.rssid | 15055430 | |
dc.local.contact | Sean Browne, Business Information Systems Department, Cairnes Business School, Nuig. - Email: sean.browne@nuigalway.ie | |
dc.local.copyrightchecked | Yes | |
dc.local.version | PUBLISHED | |
nui.item.downloads | 117 | |