Insider threats continue to be one of the most challenging threat vectors for organizations to mitigate. The impact of insider threat attacks can range from companies going out of business, loss of intellectual property, millions of dollars, to the detriment of critical infrastructures such as electrical power grids, communications, or travel infrastructures. In many insider threat attacks, perpetrators exhibited observable questionable behavior such as disgruntlement, anger, or unreliability, yet coworkers or supervisors did not report the behavior to upper management or human resources personnel. This research offers a practical method for the identification of questionable user activity through the development of a simulated monitoring system utilizing synthesized user data and behaviors. As such, the main goal of this research study is to investigate how different activities or indicators relate as precursors to an insider threat attack.
Please read all the survey questions carefully and select one answer per row. Filling out the survey will take about 15 to 20 minutes. Participating in this survey is completely voluntary and anonymous. No personal information will be collected and the data collected will be used for the purpose of this research only. Completing the survey indicates your voluntary participation in the study.
The survey instrument will be presented as follows: After this initial introduction, two sections for experts to identify technical, and psychometric indicators will be presented, followed by a section for demographic information.
This survey is conducted in affiliation with Nova Southeastern University, including Yair Levy, Ph.D. acting as Primary Investigator and one of his doctoral students; Angel L. Hueca, acting as Co-Investigator.
If you would like to see a summary of the results please send an email to firstname.lastname@example.org with the subject line "results requested." If you have any questions please send an email to the above mentioned email address.
Thank you in advance for your time and assistance. Thank you for taking the time to participate in our research study.
Angel L. Hueca
The Big-Five Personality Dimensions are OPENNESS, CONSCIENTIOUSNESS, EXTRAVERSION, AGREEABLENESS, and NEUROTICISM.
On each of the following Psychometric indicators provided, please indicate your level of agreement to the LEVEL OF IMPORTANCE that the indicator has in serving as a precursor to malicious cybersecurity insider threat activity.
For each Psychometric indictor please select your level of agreement on how an employee score on a Psychometric indicator and the scores relationship to malicious cybersecurity insider threat activity.
Please respond to the statements with respect to your expert opinion on the subject matter.