2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.50
|View full text |Cite
|
Sign up to set email alerts
|

Re-thinking Online Offenders’ SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks

Abstract: 1-Cyber security experts in the U.S. and around the globe assess potential threats to their organizations by evaluating potential attackers' skills, knowledge, resources, access to the target organization and motivation to offend (i.e. SKRAM). Unfortunately, this model fails to incorporate insights regarding online offenders' traits and the conditions surrounding the development of online criminal event. Drawing on contemporary criminological models, we present a theoretical rationale for revising the SKRAM mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…The researchers demonstrate that different data sources should be monitored in anticipation of different cyber incidents against different targets and that the most reliable signals are unique to different organizations, thus concluding that the model has to be applied and customized to the unique environment of each organization. 27 Maimon et al (2017) argue that, in addition to using information about attackers' resources, access to the target, skills, knowledge, and motivation to offend, cyber defense teams should draw knowledge from criminological models and use analyses about the attacker's personality traits and demographics, as well as circumstances that influence the offenders' decision to instigate a cyber incident. 28 Sharma et al (2013) focus on human intentions and argue that social, political, economic, and cultural factors in the physical space are often the causes for socially related cyber incidents.…”
Section: Novel Data Collection Domains and Methodological Trends That...mentioning
confidence: 99%
“…The researchers demonstrate that different data sources should be monitored in anticipation of different cyber incidents against different targets and that the most reliable signals are unique to different organizations, thus concluding that the model has to be applied and customized to the unique environment of each organization. 27 Maimon et al (2017) argue that, in addition to using information about attackers' resources, access to the target, skills, knowledge, and motivation to offend, cyber defense teams should draw knowledge from criminological models and use analyses about the attacker's personality traits and demographics, as well as circumstances that influence the offenders' decision to instigate a cyber incident. 28 Sharma et al (2013) focus on human intentions and argue that social, political, economic, and cultural factors in the physical space are often the causes for socially related cyber incidents.…”
Section: Novel Data Collection Domains and Methodological Trends That...mentioning
confidence: 99%