Organizational Vulnerability to Insider Threat What Do Australian Experts Say?

被引:1
作者
Bedford, Justine [1 ]
Van Der Laan, Luke [1 ]
机构
[1] Univ Southern Queensland, Toowoomba, Qld, Australia
来源
HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I | 2016年 / 617卷
关键词
Insider threat; Organizational vulnerability; Cyber threat; Risk management; Technological security; DELPHI METHOD;
D O I
10.1007/978-3-319-40548-3_77
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Approaches to the study of organizational vulnerabilities to intentional insider threat has been narrow in focus. Cyber security research has dominated other forms of insider threat research [1]. However, within the scope of cyber security, the effort is predominantly focused on external threats or technological mitigation strategies. Deeper understanding of organizational vulnerabilities influencing insider threat and responses to insider threats beyond technological security remains limited in Australia. Despite the increasing potential threat and impact of such risk to organizations, empirical studies remain rare. This paper presents an initial study related to identifying organizational vulnerabilities associated with intentional insider threat. A Delphi Method was employed as part of a broader mixed methods study. There was a strong consensus amongst Australian experts as to the primary organizational vulnerabilities to insider threat. These main risks extend across personnel, process, technological and strategic (resource allocation) domains. The organizational vulnerabilities identified by Australian experts is consistent with research, literature, and guidelines, available from other countries. The results confirm the need to look beyond the narrow focus on individuals and technology in order to fully address the insider threat problem. Whilst only preliminary results are presented here, future analysis of data will focus on identifying best practice solutions for the Australian market.
引用
收藏
页码:465 / 470
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2012, CERT GUIDE INSIDER T
  • [2] Band S.R., 2006, DTIC Document
  • [3] Brackney R., 2004, UNDERSTANDING INSIDE
  • [4] Brewer E., 2007, Encyclopedia of Measurement and Statistics: Delphi technique
  • [5] Catrantzos N, 2012, MANAGING THE INSIDER THREAT: NO DARK CORNERS, P1, DOI 10.1201/b12063
  • [6] Human factors in information security: The insider threat - Who can you trust these days?
    Colwill, Carl
    [J]. Information Security Technical Report, 2009, 14 (04): : 186 - 196
  • [7] Festa J. P., 2012, DTIC DOCUMENT
  • [8] Greitzer F.L., 2013, e-Service Journal, V9, P106, DOI DOI 10.2979/ESERVICEJ.9.1.106
  • [9] Keeney S, 2010, DELPHI TECHNIQUE NUR
  • [10] Lilja K. K., 2011, 2011 P PICMET 2011 T