Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat

Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat

Joyce S. Pang
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch009
Cite Chapter Cite Chapter

MLA

Pang, Joyce S. "Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 151-172. https://doi.org/10.4018/978-1-5225-5634-3.ch009

APA

Pang, J. S. (2018). Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 151-172). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch009

Chicago

Pang, Joyce S. "Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 151-172. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch009

Export Reference

Mendeley
Favorite

Abstract

The chapter aims to provide an opinion on major challenges for ongoing personality research on cyber security, especially in the area of insider threat. While research on the prevention and perpetuation of insider threat activity within cyberspace has grown substantially in the recent decade, there remain many unanswered challenges and unchartered territories of knowledge in the field. Specifically, compared to the amount of work done on algorithmic modelling approaches, much of the psychological data is scant and focuses on correlations between the so-called Big Five personality traits (i.e., extraversion, openness to experience, agreeableness, emotional stability, conscientiousness) or demographic variables (e.g., gender, age) with insider threat activity. Thus, the focus of this article is to articulate the major challenges for understanding insider threat in the context of cyber security, particularly from a personality and person-specific perspective that emphasises internal characteristics of the individual actor as explanations of actions and events.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.