Advertisement

To Catch a Thief: Practical Methods of Using Social Networks as a Mechanism for Identifying Corporate Insider Threats

  • Martyn Styles
Part of the Communications in Computer and Information Science book series (CCIS, volume 435)

Abstract

Is it possible to utilize psychological profiling through social network analysis to identify potential corporate insider threats? This research will aim to provide corporate information security teams with techniques capable of recognizing the signs of an insider threat.

Keywords

Cyber security social networking information security crime 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, J.P.: Computer security threat monitoring and surveillance. James P. Anderson Co. (1980)Google Scholar
  2. 2.
    British Psychological Society, Code of Ethics and Conduct (2010)Google Scholar
  3. 3.
    Claycomb, W.R., Huth, C.L., Flynn, L., Mcintire, D.M., Todd, B.: Chronological Examination of Insider Threat Sabotage: Preliminary Observations. CERT Insider Threat Center, Carnegie Mellon (2011)Google Scholar
  4. 4.
    Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Computers & Security 32, 90–101 (2013)CrossRefGoogle Scholar
  5. 5.
    Greitzer, F., Kangas, L., Noonan, C., Dalton, A.: Identifying at-Risk Employees: A Behavioral Model for Predicting Potential Insider Threats (2010)Google Scholar
  6. 6.
    Greitzer, F.L., Hohimer, R.E.: Modeling Human Behavior to Anticipate Insider Attacks. Journal of Strategic Security 4(2), Article 3 (2011)Google Scholar
  7. 7.
    Henderson, T., Hutton, L., Mcneilly, S.: Ethics and online social network research – developing best practices. In: BCS HCI Workshop on HCI Research in Sensitive Contexts: Ethical Considerations, Birmingham, UK (2012)Google Scholar
  8. 8.
    Legg, P., Moffat, N., Nurse, J.R.C., Happa, J., Agrafiotis, I., Goldsmith, M., Creese, S.: Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection (2013)Google Scholar
  9. 9.
    Magklaras, G.B., Furnell, S.M.: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Computers & Security 21, 62–73 (2002)CrossRefGoogle Scholar
  10. 10.
    Moreno, M.A., Goniu, N., Moreno, P.S., Diekema, D.: Ethics of social media research: common concerns and practical considerations. Cyberpsychol Behav. Soc. Netw. 16, 708–713 (2013)CrossRefGoogle Scholar
  11. 11.
    Shaw, E.D.: The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3, 20–31 (2006)CrossRefGoogle Scholar
  12. 12.
    Small, M.: The root of the problem – malice misuse or mistake. Computer Fraud & Security, 6–9 (2009)Google Scholar
  13. 13.
    Stanton, J., Stam, K., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Computers & Security 24, 124–133 (2005)CrossRefGoogle Scholar
  14. 14.
    Zimmer, M.: ‘But the data is already public”: on the ethics of research in Facebook. Ethics and Information Technology 12, 313–325 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Martyn Styles
    • 1
  1. 1.University of South WalesUnited Kingdom

Personalised recommendations