The "Human Factor" In Cybersecurity: Exploring the Accidental Insider

Copyright © 2018 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. IGI Global Fair Use Policy: As you know authors and editors of IGI Global sign an Author Warranty and Transfer of Copyright Agreement for their work published by IGI Global. However, IGI Global supports a Fair Use Policy where under this policy you may utilize your final typeset PDF (which includes the title page, table of contents and other front materials, and the copyright statement) of your chapter or article of this publication (NOT the entire book or journal issue), in your teaching materials or post to your own secure personal website and/or university repository site. Under the Fair Use Policy, however, authors and editors ARE NOT authorized to upload their chapter, article, or full book publication or journal issue to open access sites, including, but not limited to: ResearchGate, Academia.edu, SSRN, arXiv, or any others. Doing so is considered a clear violation of the International Copyright Laws and violators could face legal consequences.

[1]  P. Briggs,et al.  Behavior Change Interventions for Cybersecurity , 2017 .

[2]  David A Bennett,et al.  Conscientiousness and the incidence of Alzheimer disease and mild cognitive impairment. , 2007, Archives of general psychiatry.

[3]  Frank L. Greitzer,et al.  Identifying at-risk employees: A behavioral model for predicting potential insider threats , 2010 .

[4]  Malcolm Robert Pattinson,et al.  The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies , 2017, Comput. Secur..

[5]  C. F. Kao,et al.  The efficient assessment of need for cognition. , 1984, Journal of personality assessment.

[6]  Christian W. Probst,et al.  Countering Insider Threats , 2008 .

[7]  J. D. Tygar,et al.  Usability of Security: A Case Study, , 1998 .

[8]  Serge Egelman,et al.  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) , 2015, CHI.

[9]  Wu He,et al.  Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..

[10]  Marcus A. Butavicius,et al.  Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2016, ACIS.

[11]  Reginald A. Bruce,et al.  Decision-Making Style: The Development and Assessment of a New Measure , 1995 .

[12]  Christian W. Probst,et al.  Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[13]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[14]  Serge Egelman,et al.  Predicting privacy and security attitudes , 2015, CSOC.

[15]  Ivan Flechais,et al.  Usable Security: Why Do We Need It? How Do We Get It? , 2005 .

[16]  Jeff Joireman,et al.  Promotion Orientation Explains Why Future-Oriented People Exercise and Eat Healthy , 2012, Personality & social psychology bulletin.

[17]  Sadie Creese,et al.  Trustworthy and effective communication of cybersecurity risks: A review , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).

[18]  L. Hadlington Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.

[19]  Aad P. A. van Moorsel,et al.  SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment , 2014, HCI.

[20]  Carrie Gates,et al.  Defining the insider threat , 2008, CSIIRW '08.

[21]  ParsonsKathryn,et al.  The Human Aspects of Information Security Questionnaire (HAIS-Q) , 2017 .

[22]  Derya Ergun Ozler,et al.  CYBERLOAFING PHENOMENON IN ORGANIZATIONS: DETERMINANTS AND IMPACTS , 2012 .

[23]  P. Dolan,et al.  Influencing behaviour: The mindspace way , 2012 .

[24]  Kathryn Parsons,et al.  Can Cyberloafing and Internet Addiction Affect Organizational Information Security? , 2017, Cyberpsychology Behav. Soc. Netw..

[25]  Jason R. C. Nurse,et al.  Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.

[26]  Shari Lawrence Pfleeger,et al.  Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..

[27]  Kathryn B. Laskey,et al.  Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat Risk , 2016, STIDS.

[28]  John Leach,et al.  Improving user security behaviour , 2003, Comput. Secur..

[29]  Matthew Tischer,et al.  Users Really Do Plug in USB Drives They Find , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[30]  Dieter Gollmann,et al.  Insider Threats in Cyber Security , 2010, Insider Threats in Cyber Security.

[31]  Reference John,et al.  Big Five Inventory (bfi) , 2022 .

[32]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[33]  Aad P. A. van Moorsel,et al.  Nudging towards security: developing an application for wireless network selection for android phones , 2015, BCS HCI.

[34]  Bilal Khan,et al.  Effectiveness of information security awareness methods based on psychological theories , 2011 .

[35]  Keven G. Ruby,et al.  The Insider Threat to Information Systems , 2022 .

[36]  Malcolm Robert Pattinson,et al.  Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..

[37]  Dawn M. Cappelli,et al.  Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .

[38]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[39]  Mo Adam Mahmood,et al.  Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.

[40]  E. Weber,et al.  A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.