Developing an 'Insider Language Index' as a composite measure to detect insider threat

被引:0
作者
Martlew, Natasha G. [1 ]
Ball, Linden J. [1 ]
Dando, Coral J. [2 ]
Ormerod, Thomas C. [3 ]
Taylor, Paul J. [4 ]
Menacere, Tarek [4 ]
Sandham, Alexandra L. [5 ]
Richardson, Beth H. [1 ]
机构
[1] Univ Cent Lancashire, Sch Psychol & Humanities, Preston, England
[2] Univ Westminster, Dept Psychol, London, England
[3] Univ Sussex, Sch Psychol, Thomas C Ormerod, Falmer, England
[4] Univ Lancaster, Dept Psychol, Lancaster, England
[5] Univ Gloucestershire, Dept Psychol, Cheltenham, England
关键词
insider threat; language use; threat detection; mitigation; deception; cognitive processing; negative emotion; pronoun use; DECEPTION DETECTION; CRITERIA; FRAMEWORK; WORDS;
D O I
10.1080/13218719.2025.2486081
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Of all the issues that confront modern organisations, insider threat is one of the most challenging in terms of impact and mitigation. Typically, research has focused on defining what insider threat is and determining how such threats can be detected through technology. We suggest that technological approaches to insider-threat detection can be complemented through a greater focus on investigating the linguistic behaviours associated with insider activity. Research has highlighted that an individual's use of language offers a potential means of identifying insiders. Using Linguistic Inquiry and Word Count, this study analysed the language used by insiders and non-insiders during workplace interviews. Results revealed that, compared to non-insiders, insiders used significantly more words relating to cognitive processing, significantly more self-referential terms, and significantly more negative emotion words. Based on these findings, a generalisable Insider Language Index (ILI) was developed that has the potential to support insider detection in organisational contexts.
引用
收藏
页数:22
相关论文
共 53 条
[1]   Criteria-Based Content Analysis (CBCA) reality criteria in adults: A meta-analytic review [J].
Amado, Barbara G. ;
Arce, Ramn ;
Farina, Francisca ;
Vilarino, Manuel .
INTERNATIONAL JOURNAL OF CLINICAL AND HEALTH PSYCHOLOGY, 2016, 16 (02) :201-210
[2]  
[Anonymous], 2018, P 2018 C N AM CHAPT, DOI DOI 10.18653/V1/N18-1176
[3]  
Ben SalemM., 2009, Columbia University Computer Science Technical Report, DOI [DOI 10.7916/D8X63TSV, https://doi.org/10.7916/D8X63TSV]
[4]   THE EFFECTS OF DISCLOSURE AND INTERVENTION ON SEXUALLY ABUSED-CHILDREN [J].
BERLINER, L ;
CONTE, JR .
CHILD ABUSE & NEGLECT, 1995, 19 (03) :371-384
[5]   Cognitive-load approaches to detect deception: searching for cognitive mechanisms [J].
Blandon-Gitlin, Iris ;
Fenn, Elise ;
Masip, Jaume ;
Yoo, Aspen H. .
TRENDS IN COGNITIVE SCIENCES, 2014, 18 (09) :441-444
[6]   Accuracy of deception judgments [J].
Bond, Charles F., Jr. ;
DePaulo, Bella M. .
PERSONALITY AND SOCIAL PSYCHOLOGY REVIEW, 2006, 10 (03) :214-234
[7]   Automated computer-based feedback in expressive writing [J].
Bond, Mark ;
Pennebaker, James W. .
COMPUTERS IN HUMAN BEHAVIOR, 2012, 28 (03) :1014-1018
[8]  
Brdiczka O., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P142, DOI 10.1109/SPW.2012.29
[9]   Detecting lies and deceit: The psychology of lying and the implications for professional practice [J].
Bull, P .
JOURNAL OF COMMUNITY & APPLIED SOCIAL PSYCHOLOGY, 2006, 16 (02) :166-167
[10]  
Burns M., 2014, SECURITY INFORMATICS, V3, P1, DOI DOI 10.1186/S13388-014-0008-2