当前位置: X-MOL 学术Journal of Criminal Psychology › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Classification of malicious insiders and the association of the forms of attacks
Journal of Criminal Psychology ( IF 2.1 ) Pub Date : 2020-06-29 , DOI: 10.1108/jcp-03-2020-0012
Fletcher Glancy , David P. Biros , Nan Liang , Andy Luse

The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack.,The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality.,The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks.,This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue.,Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs.,Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm.,This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.

中文翻译:

恶意内部人员的分类和攻击形式的关联

作者认为,当前有关恶意内部人员的研究使以下事实混淆了这一事实:恶意攻击属于两种不同的类别,即发起工具性攻击和表达性攻击的类别。作者从公开来源收集恶意内部人数据,并使用文本挖掘技术分析恶意内部人特征与不同类型攻击之间的关联。作者研究了人格特征与不同类型恶意攻击之间的关系。对于人格特征,作者使用与Liang等人相同的方法。(2016),它基于关键字-特征字典提取了这些特征。对于不同类型的恶意攻击,两名评估者根据犯罪学研究修改后的标准对每个案件进行评级,以确定其表达程度和工具性。结果表明,操纵或谋取个人利益的恶意内部人员倾向于进行工具攻击。傲慢的恶意内部人员倾向于进行表达攻击。本研究使用第三方文章来识别已知恶意内部人员的人格特征。因此,可能尚未报告所有的人格特征。数据可用性是一个问题。了解是否不同的性格特征导致不同类型的攻击可以帮助管理人员识别出现这些攻击的员工并在攻击发生之前进行缓解。恶意的内部攻击可能会对企业和员工造成毁灭性的后果。帮助在潜在的恶意内部人员采取行动之前对其进行识别,以防止造成不当伤害。本研究使用132个无恶意内部人员的案例检查其攻击目标。作者所知的其他研究都没有使用过如此多的案例。
更新日期:2020-06-29
down
wechat
bug