Show simple item record

dc.contributor.authorBrowne, Sean
dc.contributor.authorLang, Michael
dc.contributor.authorGolden, William
dc.date.accessioned2018-10-12T08:30:26Z
dc.date.available2018-10-12T08:30:26Z
dc.date.issued2015-05-29
dc.identifier.citationBrowne, Sean, Lang, Michael, & Golden, William. (2015). The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent". Paper presented at the Twenty-Third European Conference on Information Systems (ECIS), Münster, Germany, 29 May.en_IE
dc.identifier.urihttp://hdl.handle.net/10379/14601
dc.description.abstractA deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external breaches but the greatest danger to an organisation lurks within. Whatever the motivation, the trusted agent inside the organisation has the potential to do more damage than an anonymous outsider and it is by increasing our understanding of this threat that we will get greater value for our defence efforts. While acknowledging that a significant number of security incidents are attributable to employees, it is important to remember in an organisational context, that simply increasing security controls and sanctions has previously been shown to be counterproductive. Therefore this research-in-progress takes the approach of increasing our understanding of how such offenders think, through a synthesis of Rational Choice Theory, Deterrence Theory, Neutralisation Theory and elements from Criminological Theory. In deliberately prioritising problems that are important in practice and basing our measures on these priorities we will improve on the contextual relevance of previous studies in this area, thereby making a solid contribution to the field.en_IE
dc.formatapplication/pdfen_IE
dc.language.isoenen_IE
dc.publisherAIS Electronic Library (AISeL)en_IE
dc.relation.ispartof23rd European Conference on Information Systems (ECIS)en
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Ireland
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/3.0/ie/
dc.subjectCybercrimeen_IE
dc.subjectComputer Abuseen_IE
dc.subjectInsider Abuseen_IE
dc.titleThe insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"en_IE
dc.typeConference Paperen_IE
dc.date.updated2018-10-06T11:15:57Z
dc.local.publishedsourcehttps://aisel.aisnet.org/cgi/viewcontent.cgi?article=1004&context=ecis2015_ripen_IE
dc.description.peer-reviewedpeer-reviewed
dc.internal.rssid15055430
dc.local.contactSean Browne, Business Information Systems Department, Cairnes Business School, Nuig. - Email: sean.browne@nuigalway.ie
dc.local.copyrightcheckedYes
dc.local.versionPUBLISHED
nui.item.downloads117


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Ireland
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 Ireland