john e. bucknertilman l. sheets louisiana tech university
TRANSCRIPT
![Page 1: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/1.jpg)
A Call for the Consideration of Individual Difference in Cyber
Security
John E. Buckner Tilman L. Sheets
Louisiana Tech University
![Page 2: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/2.jpg)
Security Breach Unintentional
• Naïve Employees Intentional
• Hackers• “Insiders”
![Page 3: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/3.jpg)
Training
UnintentionalBreach
![Page 4: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/4.jpg)
Unintentional Breach Cyber Security Training
• Educational Programs for Cyber Security Explosion of popularity and offerings (Newman,
2007) Increased demand
• Training to increase Security Providing information to employees Increasing awareness
![Page 5: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/5.jpg)
Training
UnintentionalBreach
Selection
![Page 6: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/6.jpg)
Selection Personality traits and Individual
Differences• Job “Fit”• Creating teams to maximize performance
Cognitive Abilities• Determining key dimensions that predict job
success
![Page 7: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/7.jpg)
Training
UnintentionalBreach
Selection
Intentional
Breach
Prevention/
Detection
![Page 8: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/8.jpg)
Intentional Breach Prevention and Detection
• Building hardware and software systems Beyond the scope of our presentation
• Training to increase Security Providing information to “honest “employees Increasing vigilance for identification of
potential threats (activities & behaviors)
![Page 9: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/9.jpg)
Training
UnintentionalBreach
Selection
Intentional
Breach
Prevention/
Detection
![Page 10: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/10.jpg)
Selection Individual Differences
• Profiling Motives Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010)
• Hacker Personality white-hat vs black-hat hackers
• “Insiders” Privileged information Motivation
![Page 11: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/11.jpg)
Selection Personality Framework:
• The BIG 5 Extraversion, Emotional Stability, Openness,
Conscientiousness, Agreeableness
Extraversion
Emotional Stability
Openness
ConscientiousnessAgreeableness
![Page 12: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/12.jpg)
Selection Personality Framework:
• The BIG 5 Extraversion, Emotional Stability, Openness,
Conscientiousness, Agreeableness• The BIG 5 + 1
Integrity: Honesty/Humility Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism,
Narcissism,and Primary Psychopathy (Lee & Ashton, 2005).
• Intrinsic/Extrinsic Motivation
Largely absent in Cyber Security
![Page 13: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/13.jpg)
Summary Individual Differences
• Predicting “at-risk” employees Naïve Employees “Insiders”
• Identify those most capable of performing in the field Individual personality tied to performance Selecting team members based on personality
• Profiling personality of malicious hackers Identify potential threat
![Page 14: John E. BucknerTilman L. Sheets Louisiana Tech University](https://reader036.vdocument.in/reader036/viewer/2022062712/56649c715503460f949225ea/html5/thumbnails/14.jpg)
Questions or Comments