Understanding insider threats behaviour: An adaptive network model of the evolution of an insider threat

Maria Ioana Andreea Ivan, Niek Jan van den Hout, Jan Treur, Sophie C.F. Hendrikse, Peter Roelofsma

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

This paper addresses computational analysis of insider threats. Organisational security is significantly at risk from insider threats, which are commonly caused by changes inside the organisation and worsened by unfavourable psychological characteristics and external involvements. In order to provide a comprehensive understanding of the adaptive dynamics that influence insider threats, the presented network model incorporates a variety of factors, including employee satisfaction, interactions, work performance, psychological traits, and technological methods. The simulations demonstrated that organisational changes can have a significant impact on employee behaviour, resulting in altered perceptions of the work environment, reduced satisfaction, reduced communication, and signs of isolation. These factors collectively create an environment where the risk of insider threats is heightened, as disgruntled, isolated, and dissatisfied employees are more likely to engage in malicious or negligent actions. The model’s adaptive characteristics improve its capacity to accurately represent the ever-changing interactions between human behaviour and organisational contexts. This study offers significant insights for companies aiming to improve their security frameworks by identifying crucial triggers and action points. Future efforts involve optimising model characteristics and incorporating sophisticated psychological models to improve the accuracy and practicality of predictions in real-life scenarios.
Original languageEnglish
Title of host publicationIntelligent human computer interaction
Subtitle of host publication16th international conference, IHCI 2024, Twente, The Netherlands, November 13–16, 2024, revised selected papers, part I
EditorsDhananjay Singh, Jan-Willem van 't Klooster, Uma Shanker Tiwary
PublisherSpringer Nature
Pages396-410
Number of pages15
ISBN (Electronic)9783031887055
ISBN (Print)9783031887048
DOIs
Publication statusE-pub ahead of print - 29 May 2025
Externally publishedYes
Event16th International conference on intelligent human computer interaction - Twente, Netherlands
Duration: 13 Nov 202416 Nov 2024
Conference number: 16

Publication series

NameLecture notes in computer science
PublisherSpringer nature
Volume15557
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International conference on intelligent human computer interaction
Abbreviated title IHCI 2024
Country/TerritoryNetherlands
CityTwente
Period13/11/2416/11/24

Keywords

  • Computational analysis
  • Adaptive
  • Insider Threats
  • Cybersecurity
  • Psychological Traits

Fingerprint

Dive into the research topics of 'Understanding insider threats behaviour: An adaptive network model of the evolution of an insider threat'. Together they form a unique fingerprint.

Cite this