Download presentation
Presentation is loading. Please wait.
Published byAmina Fishwick Modified over 9 years ago
1
John E. BucknerTilman L. Sheets Louisiana Tech University
2
Unintentional Naïve Employees Intentional Hackers “Insiders” Unintentional Naïve Employees Intentional Hackers “Insiders”
4
Cyber Security Training Educational Programs for Cyber Security Explosion of popularity and offerings (Newman, 2007) Increased demand Training to increase Security Providing information to employees Increasing awareness Cyber Security Training Educational Programs for Cyber Security Explosion of popularity and offerings (Newman, 2007) Increased demand Training to increase Security Providing information to employees Increasing awareness
6
Personality traits and Individual Differences Job “Fit” Creating teams to maximize performance Cognitive Abilities Determining key dimensions that predict job success Personality traits and Individual Differences Job “Fit” Creating teams to maximize performance Cognitive Abilities Determining key dimensions that predict job success
8
Prevention and Detection Building hardware and software systems Beyond the scope of our presentation Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of potential threats (activities & behaviors) Prevention and Detection Building hardware and software systems Beyond the scope of our presentation Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of potential threats (activities & behaviors)
10
Individual Differences Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010) Hacker Personality white-hat vs black-hat hackers “Insiders” Privileged information Motivation Individual Differences Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010) Hacker Personality white-hat vs black-hat hackers “Insiders” Privileged information Motivation
11
Personality Framework: The BIG 5 Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness Personality Framework: The BIG 5 Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness
12
Personality Framework: The BIG 5 Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness The BIG 5 + 1 Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism, Narcissism,and Primary Psychopathy (Lee & Ashton, 2005). Intrinsic/Extrinsic Motivation Largely absent in Cyber Security Personality Framework: The BIG 5 Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness The BIG 5 + 1 Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism, Narcissism,and Primary Psychopathy (Lee & Ashton, 2005). Intrinsic/Extrinsic Motivation Largely absent in Cyber Security
13
Individual Differences Predicting “at-risk” employees Naïve Employees “Insiders” Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality Profiling personality of malicious hackers Identify potential threat Individual Differences Predicting “at-risk” employees Naïve Employees “Insiders” Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality Profiling personality of malicious hackers Identify potential threat
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.