Author List: Wang, Jingguo; Gupta, Manish;
MIS Quarterly, 2015, Volume 39, Issue 1, Page 91-112.
This study investigates the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause applications to be exposed to insider threats are developed. Routine activity theory is synthesized with survival modeling, specifically a Weibull hazard model, and users’ system access behavior is investigated using seven months of field data from the institution. The inter-arrival times of two successive unauthorized access attempts on an application are employed as the measurement of risk. For a robustness check, the daily number of unauthorized attempts experienced by an application as an alternative measurement of risk are introduced and a zero-inflated Poisson-Gamma model is developed. The Markov chain Monte Carlo (MCMC) method is used for model estimations. The results of the study support the empirical application of routine activity theory in understanding insider threats, and provide a picture of how different applications have different levels of exposure to such threats. Theoretical and practical implications for risk management regarding insider threats are discussed. This study is among the first that uses behavioral logs to investigate victimization risk and attack proneness associated with information assets.
Keywords: Information security; insider threats; routine activity theory; information systems applications; MCMC; risk quantification; dark side of IS
Algorithm:

List of Topics

#56 0.274 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#81 0.218 applications application reasoning approach cases support hypertext case-based prototype problems consistency developed benchmarking described efficient practical address activity demonstrate effective
#264 0.131 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative mitigate failures failure cause mitigation
#276 0.118 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses important success various indicate tested
#11 0.075 structural pls measurement modeling equation research formative squares partial using indicators constructs construct statistical models researchers latent analysis results sem
#9 0.066 using subjects results study experiment did conducted task time used experienced use preference experimental presented decision-making empirical significantly effects better