a call for the consideration of individual difference in cyber security
DESCRIPTION
A Call for the Consideration of Individual Difference in Cyber Security. John E. BucknerTilman L. Sheets. Louisiana Tech University. Security Breach. Unintentional Naïve Employees Intentional Hackers “Insiders”. Unintentional Breach. Training. Unintentional Breach. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/1.jpg)
A Call for the Consideration of Individual Difference in Cyber Security
John E. Buckner Tilman L. SheetsLouisiana Tech University
![Page 2: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/2.jpg)
Security Breach Unintentional
• Naïve Employees Intentional
• Hackers• “Insiders”
![Page 3: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/3.jpg)
Training
UnintentionalBreach
![Page 4: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/4.jpg)
Unintentional Breach Cyber Security Training
• Educational Programs for Cyber Security Explosion of popularity and offerings (Newman,
2007) Increased demand
• Training to increase Security Providing information to employees Increasing awareness
![Page 5: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/5.jpg)
Training
UnintentionalBreach
Selection
![Page 6: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/6.jpg)
Selection Personality traits and Individual
Differences• Job “Fit”• Creating teams to maximize performance
Cognitive Abilities• Determining key dimensions that predict job
success
![Page 7: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/7.jpg)
Training
UnintentionalBreach
Selection
Intentional
Breach
Prevention/
Detection
![Page 8: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/8.jpg)
Intentional Breach Prevention and Detection
• Building hardware and software systems Beyond the scope of our presentation
• Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of
potential threats (activities & behaviors)
![Page 9: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/9.jpg)
Training
UnintentionalBreach
Selection
Intentional
Breach
Prevention/
Detection
![Page 10: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/10.jpg)
Selection Individual Differences
• Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010)
• Hacker Personality white-hat vs black-hat hackers
• “Insiders” Privileged information Motivation
![Page 11: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/11.jpg)
Selection Personality Framework:
• The BIG 5 Extraversion, Emotional Stability, Openness,
Conscientiousness, Agreeableness
Extraversion
Emotional Stability
Openness
ConscientiousnessAgreeableness
![Page 12: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/12.jpg)
Selection Personality Framework:
• The BIG 5 Extraversion, Emotional Stability, Openness,
Conscientiousness, Agreeableness• The BIG 5 + 1
Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism,
Narcissism,and Primary Psychopathy (Lee & Ashton, 2005).• Intrinsic/Extrinsic Motivation
Largely absent in Cyber Security
![Page 13: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/13.jpg)
Summary Individual Differences
• Predicting “at-risk” employees Naïve Employees “Insiders”
• Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality
• Profiling personality of malicious hackers Identify potential threat
![Page 14: A Call for the Consideration of Individual Difference in Cyber Security](https://reader030.vdocuments.net/reader030/viewer/2022033100/5681650a550346895dd77f1a/html5/thumbnails/14.jpg)
Questions or Comments