a call for the consideration of individual difference in cyber security

14
A Call for the Consideration of Individual Difference in Cyber Security John E. Buckner Tilman L. Sheets Louisiana Tech University

Upload: reed

Post on 23-Feb-2016

35 views

Category:

Documents


0 download

DESCRIPTION

A Call for the Consideration of Individual Difference in Cyber Security. John E. BucknerTilman L. Sheets. Louisiana Tech University. Security Breach. Unintentional Naïve Employees Intentional Hackers “Insiders”. Unintentional Breach. Training. Unintentional Breach. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Call for the Consideration of Individual Difference in Cyber Security

A Call for the Consideration of Individual Difference in Cyber Security

John E. Buckner Tilman L. SheetsLouisiana Tech University

Page 2: A Call for the Consideration of Individual Difference in Cyber Security

Security Breach Unintentional

• Naïve Employees Intentional

• Hackers• “Insiders”

Page 3: A Call for the Consideration of Individual Difference in Cyber Security

Training

UnintentionalBreach

Page 4: A Call for the Consideration of Individual Difference in Cyber Security

Unintentional Breach Cyber Security Training

• Educational Programs for Cyber Security Explosion of popularity and offerings (Newman,

2007) Increased demand

• Training to increase Security Providing information to employees Increasing awareness

Page 5: A Call for the Consideration of Individual Difference in Cyber Security

Training

UnintentionalBreach

Selection

Page 6: A Call for the Consideration of Individual Difference in Cyber Security

Selection Personality traits and Individual

Differences• Job “Fit”• Creating teams to maximize performance

Cognitive Abilities• Determining key dimensions that predict job

success

Page 7: A Call for the Consideration of Individual Difference in Cyber Security

Training

UnintentionalBreach

Selection

Intentional

Breach

Prevention/

Detection

Page 8: A Call for the Consideration of Individual Difference in Cyber Security

Intentional Breach Prevention and Detection

• Building hardware and software systems Beyond the scope of our presentation

• Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of

potential threats (activities & behaviors)

Page 9: A Call for the Consideration of Individual Difference in Cyber Security

Training

UnintentionalBreach

Selection

Intentional

Breach

Prevention/

Detection

Page 10: A Call for the Consideration of Individual Difference in Cyber Security

Selection Individual Differences

• Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010)

• Hacker Personality white-hat vs black-hat hackers

• “Insiders” Privileged information Motivation

Page 11: A Call for the Consideration of Individual Difference in Cyber Security

Selection Personality Framework:

• The BIG 5 Extraversion, Emotional Stability, Openness,

Conscientiousness, Agreeableness

Extraversion

Emotional Stability

Openness

ConscientiousnessAgreeableness

Page 12: A Call for the Consideration of Individual Difference in Cyber Security

Selection Personality Framework:

• The BIG 5 Extraversion, Emotional Stability, Openness,

Conscientiousness, Agreeableness• The BIG 5 + 1

Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism,

Narcissism,and Primary Psychopathy (Lee & Ashton, 2005).• Intrinsic/Extrinsic Motivation

Largely absent in Cyber Security

Page 13: A Call for the Consideration of Individual Difference in Cyber Security

Summary Individual Differences

• Predicting “at-risk” employees Naïve Employees “Insiders”

• Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality

• Profiling personality of malicious hackers Identify potential threat

Page 14: A Call for the Consideration of Individual Difference in Cyber Security

Questions or Comments