Investigation of attributes that influence the insider trust

A study of cyber-attack incidents emanating from insiders identifies some characteristic of the malicious user including trust, attack on hardware, software and network, and vulnerabilities of threat. Among the research that has been conducted, insider trust is identified as a critical characteristi...

Full description

Saved in:
Bibliographic Details
Main Authors: Hassan, R., Ismail, I., Kasim, S., Othman, M. R., Ramlan, R.
Format: Article
Language:English
Published: Insight Society 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/81228/1/RohayantiHassan2017_InvestigationofAttributesthatInfluencetheInsider.pdf
http://eprints.utm.my/id/eprint/81228/
http://dx.doi.org/10.18517/ijaseit.7.5.3406
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A study of cyber-attack incidents emanating from insiders identifies some characteristic of the malicious user including trust, attack on hardware, software and network, and vulnerabilities of threat. Among the research that has been conducted, insider trust is identified as a critical characteristic where trust of insider is categorized as a major potential to attack system information either high, medium or low risk to access the sensitive document. Trust characteristics is hard to be analyzed due to the different human behaviour. Thus, a survey was conducted that includes hypothesis to support the investigation of insider threat characteristic. To obtain the result of finding prominent insider trust criteria, a regression analysis is used to get the actual value. A survey has been distributed to multiple user roles of three systems namely e-Plantation System (ePS), eCampus System (eCampus) and Human Resources Management System (eHRMS). The outcome of this study demonstrates that skill and experience are two prominent factors that mainly influence the characteristic of insider trust.