2005
DOI: 10.21236/ada441293
|View full text |Cite
|
Sign up to set email alerts
|

Ten Tales of Betrayal: The Threat to Corporate Infrastructure by Information Technology Insiders Analysis and Observations

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(64 citation statements)
references
References 10 publications
0
60
0
Order By: Relevance
“…Shaw and Fischer (2005) noted that most of the threats in their study could have been prevented by timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators, who exhibited signs of vulnerability or risk well in advance of the crime: [Shaw and Fischer, 2005, pp. 41-43] To date, no systematic methods have been used to evaluate psychosocial behaviors that can predict increased risk for insider threats.…”
Section: Relevant Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Shaw and Fischer (2005) noted that most of the threats in their study could have been prevented by timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators, who exhibited signs of vulnerability or risk well in advance of the crime: [Shaw and Fischer, 2005, pp. 41-43] To date, no systematic methods have been used to evaluate psychosocial behaviors that can predict increased risk for insider threats.…”
Section: Relevant Researchmentioning
confidence: 99%
“…Workman (2009b) observes that "When attitudes are negative about surveillance, employees are less likely to be committed to their work, they display lower organizational citizenship behaviors, and in some cases resort to furtive means of retaliation against management and the organization" (p. 348). In some cases management intervention on suspected employee disgruntlement issues may actually increase an employee's frustration level (Shaw and Fischer, 2005). On the other hand, lack of monitoring due to inflated or unjustified trust can also produce adverse effects.…”
Section: Privacy and Ethical Issuesmentioning
confidence: 99%
“…In most organizations, insider threats remain statistically rare (Shaw and Fischer 2005). However, if by chance there were to be more than two cases surfacing at the same time, the attending burden would rapidly overmatch the availability of experts on hand to address those cases.…”
Section: Unifying Thread Of Conventional Defensesmentioning
confidence: 99%
“…There has been much research into the psychology and motivation of insiders, but the hard fact is that it is very difficult to predict who will commit security fraud [5]. As noted by Shaw and Fischer [6], "Eighty percent of the threats could have been prevented by timely and effective action to address the anger, pain, anxiety, or psychological impairment of perpetrators, who exhibited signs of vulnerability or risk well in advance of the crime of abuse." Clearly, prediction of insider adverse actions is a difficult challenge, but the potential payoff in avoiding asset and information loss of major consequence serves to justify further research and development of predictive mechanisms.…”
Section: Threat Prediction and Psychological Indicatorsmentioning
confidence: 99%