IS

Gupta, Manish

Topic Weight Topic Terms
0.274 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.218 applications application reasoning approach cases support hypertext case-based prototype problems consistency developed benchmarking described efficient
0.131 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.118 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Wang, Jingguo 1
dark side of IS 1 Information security 1 insider threats 1 information systems applications 1
MCMC 1 routine activity theory 1 risk quantification 1

Articles (1)

Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications (MIS Quarterly, 2015)
Authors: Abstract:
    This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause applications to be exposed to insider threats are developed. Routine activity theory is synthesized with survival modeling, specifically a Weibull hazard model, and users’ system access behavior is investigated using seven months of field data from the institution. The inter-arrival times of two successive unauthorized access attempts on an application are employed as the measurement of risk. For a robustness check, the daily number of unauthorized attempts experienced by an application as an alternative measurement of risk are introduced and a zero-inflated Poisson-Gamma model is developed. The Markov chain Monte Carlo (MCMC) method is used for model estimations. The results of the study support the empirical application of routine activity theory in understanding insider threats, and provide a picture of how different applications have different levels of exposure to such threats. Theoretical and practical implications for risk management regarding insider threats are discussed. This study is among the first that uses behavioral logs to investigate victimization risk and attack proneness associated with information assets.