Theoretical Perspective It is a fact that computer technology and its advances have brought with it many benefits for companies, in addition to threats. One of the most insidious of these is the threat from insider parties. The nature of this threat means that it is difficult to identify the precise nature of the threat before it has actually occurred, and when,...
Theoretical Perspective It is a fact that computer technology and its advances have brought with it many benefits for companies, in addition to threats. One of the most insidious of these is the threat from insider parties. The nature of this threat means that it is difficult to identify the precise nature of the threat before it has actually occurred, and when, in other words, it is too late to obtain any remedy for the situation.
From a theoretical perspective, researching and creating theories in terms of psychological, social, financial, and technological viewpoints are a vital function of ensuring the present and future of cloud computing in both business and personal operations. Form the psychological perspective, Ho and Lee (n.d., p. 82) focus the way in which employees' language can be analyzed to determine a potential insider security threat.
The reason for this suggestion is that the only element of traditional determinations of human emotion in the online world has become language, since other elements, such as facial expressions and gestures, have become obsolete in online communication. To create a theoretical platform for assessing insider threats, Ho and Lee (n.d., p. 83) cite Parker and the model known as SKRAM. This model offers five dimensions of detection regarding insider computer threats. These are focused on identifying the most likely threat sources. They include skill, knowledge, resource, authority, and motive.
The authors emphasize that the model is somewhat limited in its failure to take into account the technology of the modern age. Furthermore, the authors are also concerned with creating a predictive rather than a retrospective model. This is where the element of online language is used. The authors provide a useful guide for the theoretical assessment of language nuances where these are not highlighted by facial expressions, intonation, or gesture. By analyzing online language, managers can develop a theory by which to predict potential insider threats to their companies.
Hori, Claycomb, and Yim (n.d., p.1) also emphasize the need to investigate the socio-technical aspects of technology in order to determine and prevent potential threats. Before the environment can be secured, however, an assessment of potential threats is required. Once this has been done in a thorough and global manner, comparative studies can be conducted in order to assess any similarities among the historical threats to determine measures to take against potential future threats. Capelli and Moore (2011, p.
25) go a step further in suggesting that targeted research, not only on language, but on the security environment in general, will greatly assist in both predicting and preventing insider threats in the online world. The organization CERT (Computer Emergency Response Team), for example, is part of the Software Engineering Institute (SEI) at Carnegie Mellon University. The Team has investigated the problems and concerns surrounding insider cloud computing threats since 2001.
During this investigation, a database of more than 300 criminal cases have been compiled where persons with online access to company information, such as former employees, contractors, or business partners have abused the access and trust placed upon them. Databases like these can assist in determining the common factors in the economic, psychological, financial, and technological backgrounds of the individuals found guilty of such crimes. CERT, for example, have constructed models of the four main classes of insider cloud computing crimes, including it sabotage, intellectual property theft, espionage, and fraud.
With the use of.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.