14
A Call for the Consideration of Individual Difference in Cyber Security John E. Buckner Tilman L. Sheets Louisiana Tech University

John E. BucknerTilman L. Sheets Louisiana Tech University

Embed Size (px)

Citation preview

Page 1: John E. BucknerTilman L. Sheets Louisiana Tech University

A Call for the Consideration of Individual Difference in Cyber

Security

John E. Buckner Tilman L. Sheets

Louisiana Tech University

Page 2: John E. BucknerTilman L. Sheets Louisiana Tech University

Security Breach Unintentional

• Naïve Employees Intentional

• Hackers• “Insiders”

Page 3: John E. BucknerTilman L. Sheets Louisiana Tech University

Training

UnintentionalBreach

Page 4: John E. BucknerTilman L. Sheets Louisiana Tech University

Unintentional Breach Cyber Security Training

• Educational Programs for Cyber Security Explosion of popularity and offerings (Newman,

2007) Increased demand

• Training to increase Security Providing information to employees Increasing awareness

Page 5: John E. BucknerTilman L. Sheets Louisiana Tech University

Training

UnintentionalBreach

Selection

Page 6: John E. BucknerTilman L. Sheets Louisiana Tech University

Selection Personality traits and Individual

Differences• Job “Fit”• Creating teams to maximize performance

Cognitive Abilities• Determining key dimensions that predict job

success

Page 7: John E. BucknerTilman L. Sheets Louisiana Tech University

Training

UnintentionalBreach

Selection

Intentional

Breach

Prevention/

Detection

Page 8: John E. BucknerTilman L. Sheets Louisiana Tech University

Intentional Breach Prevention and Detection

• Building hardware and software systems Beyond the scope of our presentation

• Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of

potential threats (activities & behaviors)

Page 9: John E. BucknerTilman L. Sheets Louisiana Tech University

Training

UnintentionalBreach

Selection

Intentional

Breach

Prevention/

Detection

Page 10: John E. BucknerTilman L. Sheets Louisiana Tech University

Selection Individual Differences

• Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010)

• Hacker Personality white-hat vs black-hat hackers

• “Insiders” Privileged information Motivation

Page 11: John E. BucknerTilman L. Sheets Louisiana Tech University

Selection Personality Framework:

• The BIG 5 Extraversion, Emotional Stability, Openness,

Conscientiousness, Agreeableness

Extraversion

Emotional Stability

Openness

ConscientiousnessAgreeableness

Page 12: John E. BucknerTilman L. Sheets Louisiana Tech University

Selection Personality Framework:

• The BIG 5 Extraversion, Emotional Stability, Openness,

Conscientiousness, Agreeableness• The BIG 5 + 1

Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism,

Narcissism,and Primary Psychopathy (Lee & Ashton, 2005).

• Intrinsic/Extrinsic Motivation

Largely absent in Cyber Security

Page 13: John E. BucknerTilman L. Sheets Louisiana Tech University

Summary Individual Differences

• Predicting “at-risk” employees Naïve Employees “Insiders”

• Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality

• Profiling personality of malicious hackers Identify potential threat

Page 14: John E. BucknerTilman L. Sheets Louisiana Tech University

Questions or Comments