TY - JOUR
T1 - Trustworthiness attribution
T2 - Inquiry into insider threat detection
AU - Ho, Shuyuan Mary
AU - Kaarst-Brown, Michelle
AU - Benbasat, Izak
N1 - Funding Information:
The first author wishes to acknowledge the National Science Foundation Secure and Trustworthy Cyberspace (SaTC) Program for the support of EAGER #1347113 award (09/01/13–08/31/15).
Publisher Copyright:
© 2017 ASIS&T.
PY - 2018/2/1
Y1 - 2018/2/1
N2 - Insider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This article reviews insider threat research and outlines key propositions to conceptualize the interpretation of dynamic human information behavior in an organizational setting, which represent an integration of trustworthiness and human sensors’ attribution in close relationships. These propositions posit that when a focal individual violates integrity-based trust, the group can collectively attribute a shift in trustworthiness, triggering a natural peer attribution process that assigns cause to observed behavior. Group communication can thus reflect subtle changes in a focal individual’s perceived trustworthiness. The ability to understand group-based computer-mediated communication patterns over time may become essential in safeguarding information assets and the “digital well-being” of today’s organizations. This article contributes a novel theoretical lens to examine dynamic insights on insider threat detection.
AB - Insider threat is a “wicked” contemporary organizational problem. It poses significant threats to organizational operations and information security. This article reviews insider threat research and outlines key propositions to conceptualize the interpretation of dynamic human information behavior in an organizational setting, which represent an integration of trustworthiness and human sensors’ attribution in close relationships. These propositions posit that when a focal individual violates integrity-based trust, the group can collectively attribute a shift in trustworthiness, triggering a natural peer attribution process that assigns cause to observed behavior. Group communication can thus reflect subtle changes in a focal individual’s perceived trustworthiness. The ability to understand group-based computer-mediated communication patterns over time may become essential in safeguarding information assets and the “digital well-being” of today’s organizations. This article contributes a novel theoretical lens to examine dynamic insights on insider threat detection.
UR - http://www.scopus.com/inward/record.url?scp=85051227252&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85051227252&partnerID=8YFLogxK
U2 - 10.1002/asi.23938
DO - 10.1002/asi.23938
M3 - Article
AN - SCOPUS:85051227252
SN - 2330-1635
VL - 69
SP - 271
EP - 280
JO - Journal of the Association for Information Science and Technology
JF - Journal of the Association for Information Science and Technology
IS - 2
ER -