Cargando…

Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks

The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend this work by specifically examini...

Descripción completa

Detalles Bibliográficos
Autores principales: Khan, Neeshe, J. Houghton, Robert, Sharples, Sarah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer London 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8550909/
https://www.ncbi.nlm.nih.gov/pubmed/34725543
http://dx.doi.org/10.1007/s10111-021-00690-z
_version_ 1784591054897414144
author Khan, Neeshe
J. Houghton, Robert
Sharples, Sarah
author_facet Khan, Neeshe
J. Houghton, Robert
Sharples, Sarah
author_sort Khan, Neeshe
collection PubMed
description The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend this work by specifically examining unintentional forms of insider threat and report the outcomes of a series of detailed Critical Decision Method (CDM) led interviews with those who have experienced various forms of unwitting cybersecurity breaches. We also articulate factors likely to contribute firmly in the context of everyday work-as-done. CDM’s probing questions were used to elicit expert knowledge around how decision making occurred prior, during and post an unintentional cyber breach whilst participants were engaged in the delivery of cognitive tasks. Through the application of grounded theory to data, emerging results included themes of decision making, task factors, accidents and organisational factors. These results are utilised to inform an Epidemiological Triangle to represent the dynamic relationship between three vectors of exploit, user and the work environment that can in turn affect the resilience of cyber defences. We conclude by presenting a simple framework, which for the purposes of this work is a set of recommendations applicable in specific scenarios to reduce negative impact for understanding unintentional insider threats. We also suggest practical means to counteract such threats rooted in the lived experience of those who have fallen prey to them.
format Online
Article
Text
id pubmed-8550909
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer London
record_format MEDLINE/PubMed
spelling pubmed-85509092021-10-28 Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks Khan, Neeshe J. Houghton, Robert Sharples, Sarah Cogn Technol Work Original Article The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend this work by specifically examining unintentional forms of insider threat and report the outcomes of a series of detailed Critical Decision Method (CDM) led interviews with those who have experienced various forms of unwitting cybersecurity breaches. We also articulate factors likely to contribute firmly in the context of everyday work-as-done. CDM’s probing questions were used to elicit expert knowledge around how decision making occurred prior, during and post an unintentional cyber breach whilst participants were engaged in the delivery of cognitive tasks. Through the application of grounded theory to data, emerging results included themes of decision making, task factors, accidents and organisational factors. These results are utilised to inform an Epidemiological Triangle to represent the dynamic relationship between three vectors of exploit, user and the work environment that can in turn affect the resilience of cyber defences. We conclude by presenting a simple framework, which for the purposes of this work is a set of recommendations applicable in specific scenarios to reduce negative impact for understanding unintentional insider threats. We also suggest practical means to counteract such threats rooted in the lived experience of those who have fallen prey to them. Springer London 2021-10-28 2022 /pmc/articles/PMC8550909/ /pubmed/34725543 http://dx.doi.org/10.1007/s10111-021-00690-z Text en © The Author(s) 2021 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Original Article
Khan, Neeshe
J. Houghton, Robert
Sharples, Sarah
Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title_full Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title_fullStr Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title_full_unstemmed Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title_short Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
title_sort understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8550909/
https://www.ncbi.nlm.nih.gov/pubmed/34725543
http://dx.doi.org/10.1007/s10111-021-00690-z
work_keys_str_mv AT khanneeshe understandingfactorsthatinfluenceunintentionalinsiderthreataframeworktocounteractunintentionalrisks
AT jhoughtonrobert understandingfactorsthatinfluenceunintentionalinsiderthreataframeworktocounteractunintentionalrisks
AT sharplessarah understandingfactorsthatinfluenceunintentionalinsiderthreataframeworktocounteractunintentionalrisks