How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders

Research output: Contribution to journalArticlepeer-review

Abstract

Insider threat mitigation is a growing challenge within organizations. The development of a novel alert visualization dashboard for the identification of potentially malicious cyber insider threats was identified as necessary to alleviate this challenge. This research developed a cyber insider threat dashboard visualization prototype for detecting potentially malicious cyber insider activities QUICK.v™. This study utilized Subject Matter Experts (SMEs) by applying the Delphi Method to identify the most critical cyber visualization variables and ranking. This paper contains the detailed results of a survey based experimental research study that identified the critical cybersecurity variables also referred to as cybersecurity vital signs. The identified vital signs will aid cybersecurity analysts with triage for potentially malicious insider threats. From a total of 45 analytic variables assessed by 42 cybersecurity SMEs, the top six variables were identified using a comprehensive data collection process. The results indicated that workplace satisfaction is one of the top critical cyber visualization variables that should be measured and visualized to aid cybersecurity analysts in the detection of potentially malicious cyber insider threat activities. The process of the data collection to identify and rank critical cyber visualization variables are described.

Original languageEnglish
Pages (from-to)40-52
JournalOnline Journal of Applied Knowledge Management
Volume7
Issue number1
DOIs
StatePublished - May 22 2019

Keywords

  • anomaly detection
  • cybersecurity
  • vital signs
  • intrusion detection
  • insider threat
  • visualization

Disciplines

  • Computer Engineering

Fingerprint

Dive into the research topics of 'How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders'. Together they form a unique fingerprint.

Cite this