dc.contributor.author | Browne, Sean | |
dc.contributor.author | Lang, Michael | |
dc.contributor.author | Golden, William | |
dc.date.accessioned | 2018-10-12T09:21:18Z | |
dc.date.available | 2018-10-12T09:21:18Z | |
dc.date.issued | 2016-12-10 | |
dc.identifier.citation | Browne, Sean, Lang, Michael, & Golden, William. (2016). Contextualising the insider threat: a mixed method study. Paper presented at the 11th Pre-ICIS Workshop on Information Security and Privacy (SIGSEC), Dublin, Ireland, 10 December. | en_IE |
dc.identifier.uri | http://hdl.handle.net/10379/14604 | |
dc.description.abstract | The insider threat is potentially the most damaging and costly threat to organisations, and
while there is a considerable body of literature aimed at understanding this phenomenon, we
contend that the theories contained in such literature are most beneficial if they can be utilised
in a way that is contextually relevant. Our research, and this paper, is specifically focussed on
developing and improving this contextual validity. We find that malicious acts arising from
disgruntlement are perceived as very real problems in practice. We also present a current list
of non-malicious aberrant behaviours and show how they rank in relative seriousness to one
another. Given that the primary motivation for conducting this study is the view that reliance
on the traditional conceptualisation of a boundary or perimeter is no longer viable, our
essential contribution lies in devising a series of vignettes that empirically reflect this current
contextual validity. | en_IE |
dc.format | application/pdf | en_IE |
dc.language.iso | en | en_IE |
dc.publisher | AIS Electronic Library (AISeL) | en_IE |
dc.relation.ispartof | Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) | en |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Ireland | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/3.0/ie/ | |
dc.subject | Insider Threat | en_IE |
dc.subject | Malicious behaviour | en_IE |
dc.subject | Non-malicious behaviour | en_IE |
dc.subject | Computer | en_IE |
dc.subject | Abuse | en_IE |
dc.subject | Data mobility | en_IE |
dc.subject | Shadow IT | en_IE |
dc.title | Contextualising the insider threat: a mixed method study | en_IE |
dc.type | Conference Paper | en_IE |
dc.date.updated | 2018-10-06T11:27:27Z | |
dc.local.publishedsource | https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1001&context=wisp2016 | en_IE |
dc.description.peer-reviewed | peer-reviewed | |
dc.internal.rssid | 15060461 | |
dc.local.contact | Sean Browne, Business Information Systems Department, Cairnes Business School, Nuig. - Email: sean.browne@nuigalway.ie | |
dc.local.copyrightchecked | Yes | |
dc.local.version | PUBLISHED | |
nui.item.downloads | 166 | |