Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
In stock
SKU
39.1.05
Abstract
This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause applications to be exposed to insider threats are developed. Routine activity theory is synthesized with survival modeling, specifically a Weibull hazard model, and users’ system access behavior is investigated using seven months of field data from the institution. The inter-arrival times of two successive unauthorized access attempts on an application are employed as the measurement of risk. For a robustness check, the daily number of unauthorized attempts experienced by an application as an alternative measurement of risk are introduced and a zero-inflated Poisson-Gamma model is developed. The Markov chain Monte Carlo (MCMC) method is used for model estimations. The results of the study support the empirical application of routine activity theory in understanding insider threats, and provide a picture of how different applications have different levels of exposure to such threats. Theoretical and practical implications for risk management regarding insider threats are discussed. This study is among the first that uses behavioral logs to investigate victimization risk and attack proneness associated with information assets.
10/16/14
Additional Details
Author | Jingguo Wang, Manish Gupta, and H. Raghav Rao |
Year | 2015 |
Volume | 39 |
Issue | 1 |
Keywords | Information security, insider threats, routine activity theory, information systems applications, MCMC, risk quantification, dark side of IS |
Page Numbers | 91-112 |