Insider Threat: Language-action Cues in Group Dynamics

Language as a symbolic medium plays an important role in virtual communications. Words communicated online as action cues can provide indications of an actor's behavioral intent. This paper describes an ongoing investigation into the impact of a deceptive insider on group dynamics in virtual team collaboration. An experiment using an online game environment was conducted in 2014. Our findings support the hypothesis that language-action cues of group interactions will change significantly after an insider has been compromised and makes efforts to deceive. Furthermore, the language used in group dynamic interaction will tend to employ more cognition, inclusivity and exclusivity words when interacting with each other and with the focal insider. Future work will employ finely tuned complex Linguistic Inquiry and Word Count dictionaries to identify additional language-action cues for deception.

[1]  Niki Panteli,et al.  Trust and conflict within virtual inter-organizational alliances: a framework for facilitating knowledge sharing , 2005, Decis. Support Syst..

[2]  Frank L. Greitzer,et al.  Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats , 2012, 2012 45th Hawaii International Conference on System Sciences.

[3]  Gurpreet Dhillon,et al.  Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..

[4]  Jeremy P. Birnholtz,et al.  Butler lies: awareness, deception and design , 2009, CHI.

[5]  P. Ekman Telling lies: clues to deceit in the marketplace , 1985 .

[6]  Dale E. Zand Trust and Managerial Problem Solving , 1972 .

[7]  Chun-Ming Chang,et al.  Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations , 2007, Int. J. Hum. Comput. Stud..

[8]  Tammy L. Rapp,et al.  Team Effectiveness 1997-2007: A Review of Recent Advancements and a Glimpse Into the Future , 2008 .

[9]  Dongsong Zhang,et al.  Can online behavior unveil deceivers? - an exploratory investigation of deception in instant messaging , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[10]  J. Burgoon,et al.  Interpersonal Deception Theory , 2015 .

[11]  Shuyuan Mary Ho Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations , 2009 .

[12]  Jeffrey T. Hancock,et al.  What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .

[13]  F. C. P. Motta The theory of communicative action , 1991 .

[14]  Tarek Menacere,et al.  Detecting insider threats through language change. , 2013, Law and human behavior.

[15]  J. Pennebaker,et al.  Linguistic styles: language use as an individual difference. , 1999, Journal of personality and social psychology.

[16]  Jay F. Nunamaker,et al.  An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[17]  Richard J. Klimoski,et al.  The impact of trust on creative problem solving groups. , 1976 .

[18]  P. Ekman,et al.  Nonverbal leakage and clues to deception. , 1969, Psychiatry.

[19]  Peter Groenewegen,et al.  MANAGEMENT of the LEARNING , 2003 .

[20]  J. Pennebaker,et al.  Psychological aspects of natural language. use: our words, our selves. , 2003, Annual review of psychology.

[21]  Jeffrey T. Hancock,et al.  Reading between the lines: linguistic cues to deception in online dating profiles , 2010, CSCW '10.

[22]  Sirkka L. Jarvenpaa,et al.  Communication and Trust in Global Virtual Teams , 1999, J. Comput. Mediat. Commun..

[23]  K BurgoonJudee,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004 .

[24]  Roderick M. Kramer,et al.  Collective trust and collective action: The decision to trust as a social decision. , 1996 .

[25]  Cindy K. Chung,et al.  The development and psychometric properties of LIWC2007 , 2007 .

[26]  Steve Marsh,et al.  Human-computer-human interaction: trust in CSCW , 1997, SGCH.

[27]  J. Habermas The Theory of Communicative Action: Reason and the Rationalization of Society , 1986 .

[28]  Youngjin Yoo,et al.  Dynamic nature of trust in virtual teams , 2002, J. Strateg. Inf. Syst..

[29]  Shuyuan Mary Ho Cyber Insider Threat: Trustworthiness in Virtual Organizations , 2014 .

[30]  Todd A. Mooradian,et al.  Who Trusts? Personality, Trust and Knowledge Sharing , 2006 .

[31]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[32]  J. Rotter A new scale for the measurement of interpersonal trust. , 1967, Journal of personality.

[33]  Mike Burmester,et al.  Demystifying Insider Threat: Language-Action Cues in Group Dynamics , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[34]  Mike Burmester,et al.  Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[35]  R. Lewicki,et al.  Developing and Maintaining Trust in Work Relationships , 1996 .

[36]  Frank L. Greitzer,et al.  Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media , 2013, AMCIS.

[37]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[38]  Csr Young,et al.  How to Do Things With Words , 2009 .

[39]  James J. Lindsay,et al.  Cues to deception. , 2003, Psychological bulletin.

[40]  L. Hosmer TRUST: THE CONNECTING LINK BETWEEN ORGANIZATIONAL THEORY AND PHILOSOPHICAL ETHICS , 1995 .

[41]  Jonathan M. Hollister,et al.  Cyber Insider Threat in Virtual Organizations , 2014 .

[42]  Frank L. Lars J. Christine F. Christopher R. Thomas Greitzer,et al.  Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis , 2013 .

[43]  Jeffrey T. Hancock,et al.  The truth about lying in online dating profiles , 2007, CHI.

[44]  Shuyuan Mary Ho A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations , 2009 .

[45]  HsuMeng-Hsiang,et al.  Knowledge sharing behavior in virtual communities , 2007 .

[46]  Jeffrey T. Hancock,et al.  On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .

[47]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[48]  Steven Furnell,et al.  A preliminary model of end user sophistication for insider threat prediction in IT systems , 2005, Comput. Secur..

[49]  Ryan T. Wright,et al.  The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived , 2010, J. Manag. Inf. Syst..

[50]  P. Ekman,et al.  Who can catch a liar? , 1991, The American psychologist.

[51]  Frank L. Greitzer,et al.  Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication , 2013, 2013 46th Hawaii International Conference on System Sciences.