报告主题：Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
报告人: Jingguo Wang 教授
报告简介：This study has investigated the risk of insider threats associated with different applications within a financial institution. Extending routine activity theory (RAT) from criminology literature to information systems security, we developed hypotheses regarding how application characteristics, namely value, inertia, visibility, accessibility, and guardians, cause applications to be exposed to insider threats. We synthesized routine activity theory with survival modeling, specifically a Weibull hazard model, and investigated users’ system access behaviors using seven months of field data from the institution. The inter-arrival times of two successive unauthorized access attempts on an application were employed as the measurement of risk. For a robustness check, we introduced the daily number of unauthorized attempts experienced by an application as an alternative measurement of risk and developed a zero-inflated Poisson Gamma model. We used the Markov chain Monte Carlo (MCMC) method for the model estimations. Our results support the empirical application of routine activity theory in understanding insider threats, and provide a picture of how different applications have different levels of exposure to such threats. Theoretical and practical implications for risk management regarding insider threats are discussed. This study is among the first that uses behavioral logs to investigate victimization risk and attack proneness associated with information assets.
人物简介：Jingguo Wang is a Professor of Information Systems and Haitian scholar of Dalian university of technology. He graduated from SUNY-Buffalo. His work has been published in MIS Quarterly, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems, Decision Support Systems, among others. His papers have received best paper awards at AMCIS and the International Conference on Internet Monitoring and Protection. His research has been supported by National Science Foundation and the University of Texas at Arlington.