A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations
This study adopts a socio-technical approach to examining perceptions of human trustworthiness as a key component for countering insider threats in a virtual collaborative context. The term insider threat refers to situations where a critical member of an organization behaves against the interests of that organization, in an illegal and/or unethical manner. Identifying and detecting how this individual’s behavior changes over time - and how anomalous behavior can be detected - are important elements in the preventive control of insider threat behaviors. This study focuses on understanding how anomalous behavior can be detected by observers. While human observations are fallible, this study adopts the concept of human-observed changes in behavior as being analogous to “sensors” on a computer network. Using online team-based game-playing, this study seeks to re-create realistic situations in which human sensors have the opportunity to observe changes in the behavior of a focal individual — in the case of this research, a team leader. Four sets of experimental situations are created to test the core hypotheses. Results of this study may lead to the development of semi-automated or fully-automated behavioral detection system that attempts to predict the occurrence of malfeasance.
KeywordsStein Editing Mellon
Unable to display preview. Download preview PDF.
- 3.Giddens, A. (1979). Central Problems in Social Theory: Action, Structure and Contradiction in Social Analysis. Berkeley, CA: University of California Press.Google Scholar
- 4.Handy, C. (1995). Trust and the Virtual Organization. The Harvard Business Review Book Series: Creating Value in the Network Economy. Harvard Business School Press, Boston, MA, 1999, 107–120.Google Scholar
- 5.Hardin, R. (2003). Gaming trust. In E. Ostrom & J. Walker (Eds.), Trust and reciprocity: Interdisciplinary lessons from experimental research (pp. 80–101). New York: Russell Sage Foundation.Google Scholar
- 8.Ho, S. M. (2008). Attribution-based Anomaly-Detection: Trustworthiness in an Online Community. Social Computing, Behavioral Modeling, and Prediction. Springer: January 2008, 129–140.Google Scholar
- 9.Holmes, J. G., and Rempel, J. K. (1989a). “Trust in Close Relationships.” In Review of Personality and Social Psychology, Vol. 10, ed. C. Hendrick. Beverly Hills, CA: Sage Publications.Google Scholar
- 10.Holmes, J. G., & Rempel, J. K. (1989b). Trust in close relationship. In C. Hendrick. (Ed.), Close relationship (pp. 187–220). Newbury Park: CA: Sage.Google Scholar
- 12.Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. (2005). “Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors.” National Threat Assessment Center, U.S. Secret Service, and CERT ® Coordination Center/Software Engineering Institute, Carnegie Mellon, May 2005, pp.21–34. Obtained from http://www.cert.org/archive/pdf/insidercross051105.pdf on April 10, 2007.
- 13.Kelley, H.H. (1973). The Process of Causal Attribution, American Psychologist, Feb 1973, 107–128. Obtained from http://faculty.babson.edu/krollag/org_site/soc_psych/kelly_attrib.html on July 5th, 2007.
- 14.Randazzo, M. R., Keeney, M., Kowalski, E., Cappelli, D., and Moore, A. (2004). Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. National Threat Assessment Center, U.S. Secret Service, and CERT® Coordination Center/Software Engineering Institute, Carnegie Mellon, August 2004. Obtained from http://www.secretservice.gov/ntac/its_report_040820.pdf n April 10 2007.
- 16.Richardson, R. (2007). 2007 CSI Computer Crime and Security Survey. Computer Security Institute.Google Scholar
- 20.Steinke, G. D. (1975). The prediction of untrustworthy behavior and the Interpersonal Trust Scale. Unpublished doctoral dissertation, University of Connecticut, 1975.Google Scholar