Diese Datenbank enthält über 40.000 Dokumente zu Themen aus den Bereichen Formalerschließung – Inhaltserschließung – Information Retrieval.
© 2015 W. Gödert, TH Köln, Institut für Informationswissenschaft / Powered by litecat, BIS Oldenburg (Stand: 28. April 2022)
1Ho, S.M. ; Kaarst-Brown, M. ; Benbasat, I.: Trustworthiness attribution : inquiry into insider threat detection.
In: Journal of the Association for Information Science and Technology. 69(2018) no.2, S.271-280.
Abstract: Insider threat is a "wicked" contemporary organizational problem. It poses significant threats to organizational operations and information security. This article reviews insider threat research and outlines key propositions to conceptualize the interpretation of dynamic human information behavior in an organizational setting, which represent an integration of trustworthiness and human sensors' attribution in close relationships. These propositions posit that when a focal individual violates integrity-based trust, the group can collectively attribute a shift in trustworthiness, triggering a natural peer attribution process that assigns cause to observed behavior. Group communication can thus reflect subtle changes in a focal individual's perceived trustworthiness. The ability to understand group-based computer-mediated communication patterns over time may become essential in safeguarding information assets and the "digital well-being" of today's organizations. This article contributes a novel theoretical lens to examine dynamic insights on insider threat detection.
Inhalt: Vgl.: http://onlinelibrary.wiley.com/doi/10.1002/asi.23938/full.
2Ho, S.M. ; Hancock, J.T. ; Booth, C.: Ethical dilemma : deception dynamics in computer-mediated group communication.
In: Journal of the Association for Information Science and Technology. 68(2017) no.12, S.2729-2742.
Abstract: Words symbolically represent communicative and behavioral intent, and can provide clues to a communicator's future actions in online communication. This paper describes a sociotechnical study conducted from 2008 through 2015 to identify deceptive communicative intent within group context as manifested in language-action cues. Specifically, this study used an online team-based game that simulates real-world deceptive insider scenarios to examine several dimensions of group communication. First, we studied how language-action cues differ between groups with and groups without a compromised actor. We also examine how these cues differ within groups in terms of the group members' individual and collective interactions with the compromised actor. Finally, we look at how the cues of compromised actors differ from those of noncompromised actors, and how communication behavior changes after an actor is presented with an ethical dilemma. The results of the study further our understanding of language-action cues as indicators for unmasking a potential deceptive insider.
Inhalt: Vgl.: http://onlinelibrary.wiley.com/doi/10.1002/asi.23849/full.
3Ho, S.M. ; Benbasat, I.: Dyadic attribution model : a mechanism to assess trustworthiness in virtual organizations.
In: Journal of the Association for Information Science and Technology. 65(2014) no.8, S.1555-1576.
Abstract: Language as a symbolic medium plays an important role in virtual communications. In a primarily linguistic environment such as cyberspace, words are an expressed form of intent and actions. We investigate the functions of words and actions in identifying behavioral anomalies of social actors to safeguard the virtual organization. Social actors are likened to "sensors" as they observe changes in a focal individual's behavior during computer-mediated communications. Based on social psychology theories and pragmatic views of words and actions in online communications, we theorize a dyadic attribution model that helps make sense of anomalous behavior in creative online experiments. This model is then tested in an experiment. Findings show that observation of the behavioral differences between words and actions, based on either external or internal causality, can offer increased ability to detect the compromised trustworthiness of observed individuals-possibly leading to early detection of insider threat potential. The dyadic attribution model developed in this sociotechnical study can function to detect behavioral anomalies in cyberspace, and protect the operations of a virtual organization.
4Ho, S.M. ; Bieber, M. ; Song, M. ; Zhang, X.: Seeking beyond with IntegraL : a user study of sense-making enabled by anchor-based virtual integration of library systems.
In: Journal of the American Society for Information Science and Technology. 64(2013) no.9, S.1927-1945.
Abstract: This article presents a user study showing the effectiveness of a linked-based, virtual integration infrastructure that gives users access to relevant online resources, empowering them to design an information-seeking path that is specifically relevant to their context. IntegraL provides a lightweight approach to improve and augment search functionality by dynamically generating context-focused "anchors" for recognized elements of interest generated by library services. This article includes a description of how IntegraL's design supports users' information-seeking behavior. A full user study with both objective and subjective measures of IntegraL and hypothesis testing regarding IntegraL's effectiveness of the user's information-seeking experience are described along with data analysis, implications arising from this kind of virtual integration, and possible future directions.