Differentiating Insider and Outsider Cyberattacks on Businesses

dc.contributor.authorDearden, Thomas E.en
dc.contributor.authorParti, Katalinen
dc.contributor.authorHawdon, James E.en
dc.contributor.authorGainey, Randyen
dc.contributor.authorVandecar-Burdin, Tancyen
dc.contributor.authorAlbanese, Jayen
dc.date.accessioned2024-08-09T13:43:34Zen
dc.date.available2024-08-09T13:43:34Zen
dc.date.issued2023-08-01en
dc.description.abstractThe use of information and communication technologies in business has opened several new ways for employees to commit cybercrimes against their employers. Utilizing opportunity theory, the current paper investigates the characteristics of businesses victimized by employee-committed cyberattacks and compares insider- and outsider-committed cybercrime in terms of the damage they cause to the business. We used online sampling to obtain information on 350 businesses in the Commonwealth of Virginia, revealing 29 outsider cases and 17 insider attacks that were clearly identified. We found that insider attacks were more costly, resulting in more damage than external attacks; the most frequent attack type was impersonating the organization online for insiders, and viruses, spyware, and malware for outsiders. Our data suggested restricting personal devices, making cybersecurity a priority, cybersecurity updates among management, and employee training do not significantly lessen the risk or mitigate the effects of insider attacks. We suggest that organizational security culture must be refined and strengthened to identify and prevent insider attacks successfully.en
dc.description.versionAccepted versionen
dc.format.extentPages 871-886en
dc.format.extent16 page(s)en
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1007/s12103-023-09727-7en
dc.identifier.eissn1936-1351en
dc.identifier.issn1066-2316en
dc.identifier.issue4en
dc.identifier.orcidParti, Katalin [0000-0002-8484-3237]en
dc.identifier.orcidDearden, Thomas [0000-0003-0549-927X]en
dc.identifier.orcidHawdon, James [0000-0002-0273-2227]en
dc.identifier.urihttps://hdl.handle.net/10919/120899en
dc.identifier.volume48en
dc.language.isoenen
dc.publisherSpringer Natureen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectinsider cyberattacken
dc.subjectbusinessesen
dc.subjectopportunity theoryen
dc.subjectcosten
dc.subjectharmen
dc.titleDifferentiating Insider and Outsider Cyberattacks on Businessesen
dc.title.serialAmerican Journal of Criminal Justiceen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherArticleen
dcterms.dateAccepted2023-06-30en
pubs.organisational-group/Virginia Techen
pubs.organisational-group/Virginia Tech/All T&R Facultyen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciencesen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/Sociologyen
pubs.organisational-group/Virginia Tech/Liberal Arts and Human Sciences/CLAHS T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Dearden et al_2023_Insider PROOF.pdf
Size:
582.06 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Plain Text
Description: