Differentiating Insider and Outsider Cyberattacks on Businesses

The use of information and communication technologies in business has opened several new ways for employees to commit cybercrimes against their employers. Utilizing opportunity theory, the current paper investigates the characteristics of businesses victimized by employee-committed cyberattacks and...

Full description

Saved in:  
Bibliographic Details
Main Author: Dearden, Thomas E. (Author)
Contributors: Parti, Katalin ; Hawdon, James ; Gainey, Randy R. ; Vandecar-Burdin, Tancy ; Albanese, Jay S.
Format: Electronic Article
Language:English
Published: 2023
In: American journal of criminal justice
Year: 2023, Volume: 48, Issue: 4, Pages: 871-886
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 1883309514
003 DE-627
005 20240313104931.0
007 cr uuu---uuuuu
008 240313s2023 xx |||||o 00| ||eng c
024 7 |a 10.1007/s12103-023-09727-7  |2 doi 
035 |a (DE-627)1883309514 
035 |a (DE-599)KXP1883309514 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Dearden, Thomas E.  |e VerfasserIn  |4 aut 
245 1 0 |a Differentiating Insider and Outsider Cyberattacks on Businesses 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The use of information and communication technologies in business has opened several new ways for employees to commit cybercrimes against their employers. Utilizing opportunity theory, the current paper investigates the characteristics of businesses victimized by employee-committed cyberattacks and compares insider- and outsider-committed cybercrime in terms of the damage they cause to the business. We used online sampling to obtain information on 350 businesses in the Commonwealth of Virginia, revealing 29 outsider cases and 17 insider attacks that were clearly identified. We found that insider attacks were more costly, resulting in more damage than external attacks; the most frequent attack type was impersonating the organization online for insiders, and viruses, spyware, and malware for outsiders. Our data suggested restricting personal devices, making cybersecurity a priority, cybersecurity updates among management, and employee training do not significantly lessen the risk or mitigate the effects of insider attacks. We suggest that organizational security culture must be refined and strengthened to identify and prevent insider attacks successfully. 
650 4 |a Businesses 
650 4 |a Cost 
650 4 |a Harm 
650 4 |a Insider cyberattack 
650 4 |a Opportunity Theory 
700 1 |a Parti, Katalin  |e VerfasserIn  |0 (DE-588)1221558501  |0 (DE-627)1738776212  |4 aut 
700 1 |a Hawdon, James  |e VerfasserIn  |0 (DE-588)1047218992  |0 (DE-627)777857898  |0 (DE-576)400561077  |4 aut 
700 1 |a Gainey, Randy R.  |d 1963-  |e VerfasserIn  |0 (DE-588)1024623017  |0 (DE-627)721009735  |0 (DE-576)175816115  |4 aut 
700 1 |a Vandecar-Burdin, Tancy  |e VerfasserIn  |4 aut 
700 1 |a Albanese, Jay S.  |d 1953-  |e VerfasserIn  |0 (DE-588)171947134  |0 (DE-627)696838761  |0 (DE-576)160043069  |4 aut 
773 0 8 |i Enthalten in  |t American journal of criminal justice  |d New York, NY [u.a.] : Springer, 1975  |g 48(2023), 4, Seite 871-886  |h Online-Ressource  |w (DE-627)545782163  |w (DE-600)2387971-3  |w (DE-576)306834987  |x 1936-1351  |7 nnns 
773 1 8 |g volume:48  |g year:2023  |g number:4  |g pages:871-886 
856 4 0 |u https://doi.org/10.1007/s12103-023-09727-7  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4499830338 
LOK |0 003 DE-627 
LOK |0 004 1883309514 
LOK |0 005 20240313105040 
LOK |0 008 240313||||||||||||||||ger||||||| 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 866   |x zotak: Nacherfasst, wegen zota-Pause 
LOK |0 935   |a krzo 
ORI |a WA-MARC-krimdoka001.raw