UTHM Institutional Repository

Investigation of attributes that influence the insider trust

Hassan, Rohayanti and Ismail, Iszaida and Kasim, Shahreen and Othman, Muhammad Razib and Ramlan, Rohaizan (2017) Investigation of attributes that influence the insider trust. International Journal on Advanced Science, Engineering and Information Technology, 7 (5). pp. 1777-1783. ISSN 20885334

Full text not available from this repository.


A study of cyber-attack incidents emanating from insiders identifies some characteristic of the malicious user including trust, attack on hardware, software and network, and vulnerabilities of threat. Among the research that has been conducted, insider trust is identified as a critical characteristic where trust of insider is categorized as a major potential to attack system information either high, medium or low risk to access the sensitive document. Trust characteristics is hard to be analyzed due to the different human behaviour. Thus, a survey was conducted that includes hypothesis to support the investigation of insider threat characteristic. To obtain the result of finding prominent insider trust criteria, a regression analysis is used to get the actual value. A survey has been distributed to multiple user roles of three systems namely e-Plantation System (ePS), eCampus System (eCampus) and Human Resources Management System (eHRMS). The outcome of this study demonstrates that skill and experience are two prominent factors that mainly influence the characteristic of insider trust.

Item Type: Article
Uncontrolled Keywords: Insider trust; insider threat; insider threat prediction; trust characteristics; insider trust criteria
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Faculty of Computer Science and Information Technology > Department of Web Technology
Depositing User: Mr. Mohammad Shaifulrip Ithnin
Date Deposited: 31 Mar 2019 07:37
Last Modified: 31 Mar 2019 07:37
URI: http://eprints.uthm.edu.my/id/eprint/10922
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item