Matches in SemOpenAlex for { <https://semopenalex.org/work/W8273479> ?p ?o ?g. }
Showing items 1 to 75 of
75
with 100 items per page.
- W8273479 abstract "The purpose of this research is to identify the factors that influence organizational insiders to violate information security policies. There are numerous accounts of successful malicious activities conducted by employees and internal users of organizations. Researchers and organizations have begun looking at methods to reduce or mitigate the insider threat problem. Few proposed methods and models to identify, deter, and prevent the insider threat are based on empirical data. Additionally, few studies have focused on the targets or goals of the insider with organizational control as a foundation. From a target perspective, an organization might be able to control the outcome of a malicious insider threat attack. This research applied a criminology lens as an organization policy violation is, or resembles, a criminal activity. This research uses the Routine Activities Theory (RAT) as a guide to develop a theoretical model. The adoption of RAT was for its focus on the target and the protective controls, while still taking into account the motivated offender. The study identified the components of the model concerning insider threats, espionage, and illicit behavior related to information systems through literature. This led to the development of 10 hypotheses regarding the relationships of key factors that influence malicious insider activity. Data was collected using a scenario-based survey, which allowed for impartial responses from a third-person perspective. This technique has become popular in the field of criminology, as the effects of social desirability, acceptance, or repudiation will not be a concern. A pilot test verified the survey's ability to collect the appropriate data. The research employed Structural Equation Modeling (SEM) and Confirmatory Factor Analysis (CFA) techniques to analyze and evaluate the data. SEM and CFA techniques identified the fit of the model and the factors that influence information security policy violations. The result of the analysis provided criteria to accept the hypotheses and to identify key factors that influence insider Information System policy violations. This research identified the relationships and the level of influence between each factor." @default.
- W8273479 created "2016-06-24" @default.
- W8273479 creator A5041671599 @default.
- W8273479 creator A5045708390 @default.
- W8273479 date "2012-01-01" @default.
- W8273479 modified "2023-09-27" @default.
- W8273479 title "An approach to effectively identify insider attacks within an organization" @default.
- W8273479 hasPublicationYear "2012" @default.
- W8273479 type Work @default.
- W8273479 sameAs 8273479 @default.
- W8273479 citedByCount "0" @default.
- W8273479 crossrefType "journal-article" @default.
- W8273479 hasAuthorship W8273479A5041671599 @default.
- W8273479 hasAuthorship W8273479A5045708390 @default.
- W8273479 hasConcept C110875604 @default.
- W8273479 hasConcept C111472728 @default.
- W8273479 hasConcept C120936955 @default.
- W8273479 hasConcept C12713177 @default.
- W8273479 hasConcept C136764020 @default.
- W8273479 hasConcept C138885662 @default.
- W8273479 hasConcept C144133560 @default.
- W8273479 hasConcept C154945302 @default.
- W8273479 hasConcept C17744445 @default.
- W8273479 hasConcept C199539241 @default.
- W8273479 hasConcept C2775924081 @default.
- W8273479 hasConcept C2776633304 @default.
- W8273479 hasConcept C2778971194 @default.
- W8273479 hasConcept C2779390178 @default.
- W8273479 hasConcept C38652104 @default.
- W8273479 hasConcept C39549134 @default.
- W8273479 hasConcept C41008148 @default.
- W8273479 hasConceptScore W8273479C110875604 @default.
- W8273479 hasConceptScore W8273479C111472728 @default.
- W8273479 hasConceptScore W8273479C120936955 @default.
- W8273479 hasConceptScore W8273479C12713177 @default.
- W8273479 hasConceptScore W8273479C136764020 @default.
- W8273479 hasConceptScore W8273479C138885662 @default.
- W8273479 hasConceptScore W8273479C144133560 @default.
- W8273479 hasConceptScore W8273479C154945302 @default.
- W8273479 hasConceptScore W8273479C17744445 @default.
- W8273479 hasConceptScore W8273479C199539241 @default.
- W8273479 hasConceptScore W8273479C2775924081 @default.
- W8273479 hasConceptScore W8273479C2776633304 @default.
- W8273479 hasConceptScore W8273479C2778971194 @default.
- W8273479 hasConceptScore W8273479C2779390178 @default.
- W8273479 hasConceptScore W8273479C38652104 @default.
- W8273479 hasConceptScore W8273479C39549134 @default.
- W8273479 hasConceptScore W8273479C41008148 @default.
- W8273479 hasLocation W82734791 @default.
- W8273479 hasOpenAccess W8273479 @default.
- W8273479 hasPrimaryLocation W82734791 @default.
- W8273479 hasRelatedWork W1577806296 @default.
- W8273479 hasRelatedWork W1966451102 @default.
- W8273479 hasRelatedWork W1995120430 @default.
- W8273479 hasRelatedWork W2126536038 @default.
- W8273479 hasRelatedWork W2153038337 @default.
- W8273479 hasRelatedWork W2295660473 @default.
- W8273479 hasRelatedWork W2547447756 @default.
- W8273479 hasRelatedWork W2614773713 @default.
- W8273479 hasRelatedWork W2742346346 @default.
- W8273479 hasRelatedWork W2800322166 @default.
- W8273479 hasRelatedWork W2801344188 @default.
- W8273479 hasRelatedWork W2912931411 @default.
- W8273479 hasRelatedWork W3022876098 @default.
- W8273479 hasRelatedWork W3097132857 @default.
- W8273479 hasRelatedWork W3121022348 @default.
- W8273479 hasRelatedWork W3138649687 @default.
- W8273479 hasRelatedWork W3159239323 @default.
- W8273479 hasRelatedWork W3161249366 @default.
- W8273479 hasRelatedWork W3175606892 @default.
- W8273479 hasRelatedWork W2924184497 @default.
- W8273479 isParatext "false" @default.
- W8273479 isRetracted "false" @default.
- W8273479 magId "8273479" @default.
- W8273479 workType "article" @default.