SOFIT: Sociotechnical and Organizational Factors for Insider Threat

被引:14
|
作者
Greitzer, Frank L. [1 ]
Purl, Justin [2 ]
Leong, Yung Mei
Becker, D. E. [2 ]
机构
[1] PsyberAnalytix, Richland, WA 99352 USA
[2] Human Resources Res Org, Alexandria, VA USA
关键词
insider threat ontology; sociotechnical indicators; knowledge modeling; expert knowledge elicitation; TRAITS; STATES; PERSONALITY; VIOLENCE; STRESS; RISK;
D O I
10.1109/SPW.2018.00035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Human behavioral factors have been insufficiently represented in structured models (e.g., ontology frameworks) of insider threat risk. This paper describes the design and development of a structured model that emphasizes individual and organizational sociotechnical factors while incorporating technical indicators from previous work. We compare this model with previous research and describe a use case to demonstrate how the model can be applied as an ontology. We also summarize results of an expert knowledge elicitation study to reveal relationships among indicators and to examine several quantitative models for assessing threat of cases comprising multiple indicators.
引用
收藏
页码:197 / 206
页数:10
相关论文
共 50 条
  • [21] Intelligence Analyses and the Insider Threat
    Santos, Eugene, Jr.
    Hien Nguyen
    Yu, Fei
    Kim, Keum Joo
    Li, Deqing
    Wilkinson, John T.
    Olson, Adam
    Russell, Jacob
    Clark, Brittany
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347
  • [22] An Insider Threat Prediction Model
    Kandias, Miltiadis
    Mylonas, Alexios
    Virvilis, Nikos
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
  • [23] Addressing the Insider Threat Introduction
    Pfleeger, Shari Lawrence
    Stolfo, Salvatore J.
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 10 - 13
  • [24] Inside the Insider Threat (Introduction)
    Bishop, Matt
    Nance, Kara
    Claycomb, William
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
  • [25] Guarding Against the Insider Threat
    Archuleta, Edmund G.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2009, 101 (05): : 38 - +
  • [26] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [27] Honeypots: Catching the insider threat
    Spitzner, L
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 170 - 179
  • [28] Safeguarding against the insider threat
    Bulpett B.
    Network Security, 2020, 2020 (06): : 14 - 17
  • [29] A Method of Evaluation for Insider Threat
    Wang, Yi-Lu
    Yang, Sang-Chin
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
  • [30] Balancing the insider and outsider threat
    Walton, Richard
    Limited, Walton-Mackenzie
    Computer Fraud and Security, 2006, 2006 (11): : 8 - 11