Kaupins, G. and Minch, R. (2005). Legal and ethical impli-
cations of employee location monitoring. In System
Sciences, 2005. HICSS’05. Proceedings of the 38th
Annual Hawaii International Conference on, pages
133a–133a. IEEE.
Kosinski, M., Bachrach, Y., Kohli, P., Stillwell, D., and
Graepel, T. (2014). Manifestations of user personal-
ity in website choice and behaviour on online social
networks. Machine Learning, 95(3):357–380.
Kruskal, J. B. and Wish, M. (1978). Multidimensional scal-
ing, volume 11. Sage.
Legg, P., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis,
I., Goldsmith, M., and Creese, S. (2013). Towards
a conceptual model and reasoning structure for in-
sider threat detection. Journal of Wireless Mobile Net-
works, Ubiquitous Computing, and Dependable Ap-
plications, 4(4):20–37.
Liang, T.-P. and Lai, H.-J. (2002). Discovering user in-
terests from web browsing behavior: An application
to internet news services. In System Sciences, 2002.
HICSS. Proceedings of the 35th Annual Hawaii Inter-
national Conference on, pages 2718–2727. IEEE.
Marcus, B. and Schuler, H. (2004). Antecedents of coun-
terproductive behavior at work: a general perspective.
Journal of Applied Psychology, 89(4):647.
Nord, G. D., McCubbins, T. F., and Nord, J. H. (2006). E-
monitoring in the workplace: privacy, legislation, and
surveillance software. Communications of the ACM,
49(8):72–77.
Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M.,
Creese, S., Wright, G. R., and Whitty, M. (2014). Un-
derstanding insider threat: A framework for charac-
terising attacks. In Workshop on Research for Insider
Threat (WRIT) held as part of the IEEE Computer
Society Security and Privacy Workshops (SPW14), in
conjunction with the IEEE Symposium on Security
and Privacy (SP). IEEE.
O’Connor, B. P. and Dyce, J. A. (1998). A test of mod-
els of personality disorder configuration. Journal of
Abnormal Psychology, 107(1):3.
Paulhus, D. L. and Williams, K. M. (2002). The dark
triad of personality: Narcissism, machiavellianism,
and psychopathy. Journal of research in personality,
36(6):556–563.
Pennebaker, J. W., Francis, M. E., and Booth, R. J. (2001).
Linguistic inquiry and word count: Liwc 2001. Mah-
way: Lawrence Erlbaum Associates, 71:2001.
Phyo, A. and Furnell, S. (2004). A detection-oriented clas-
sification of insider IT misuse. In Third Security Con-
ference.
Pocius, K. E. (1991). Personality factors in human-
computer interaction: A review of the literature. Com-
puters in Human Behavior, 7(3):103–135.
PWC (2014). US cybercrime: Rising risks, reduced readi-
ness: Key findings from the 2014 US state of cyber-
crime survey.
Schultz, E. E. (2002). A framework for understanding
and predicting insider attacks. Computers & Security,
21(6):526–531.
Schwartz, H. A., Eichstaedt, J. C., Kern, M. L., Dziurzyn-
ski, L., Ramones, S. M., Agrawal, M., Shah, A.,
Kosinski, M., Stillwell, D., Seligman, M. E., et al.
(2013). Personality, gender, and age in the language
of social media: The open-vocabulary approach. PloS
one, 8(9):e73791.
Shaban, K. B., Chan, J., and Szeto, R. (2010). Interest-
determining web browser. In Advances in Data Min-
ing. Applications and Theoretical Aspects, pages 518–
528. Springer.
Shaw, E., Ruby, K., and Post, J. (1998). The insider threat to
information systems: The psychology of the danger-
ous insider. Security Awareness Bulletin, 2(98):1–10.
Shaw, E. D., Stock, H. V., et al. (2011). Behavioral risk in-
dicators of malicious insider theft of intellectual prop-
erty: Misreading the writing on the wall. White Paper,
Symantec, Mountain View, CA.
Shen, J., Brdiczka, O., and Liu, J. (2013). Understanding
email writers: Personality prediction from email mes-
sages. In User Modeling, Adaptation, and Personal-
ization, pages 318–330. Springer.
Spitzner, L. (2003). Honeypots: Catching the insider threat.
In Computer Security Applications Conference, 2003.
Proceedings. 19th Annual, pages 170–179. IEEE.
Sumner, C., Byers, A., Boochever, R., and Park, G. J.
(2012). Predicting dark triad personality traits from
twitter usage and a linguistic analysis of tweets. In
Machine Learning and Applications (ICMLA), 2012
11th International Conference on, volume 2, pages
386–393. IEEE.
Surhone, L. M. (2010). KNIME: R (programming Lan-
guage), WEKA, Java. Betascript Publishing.
Urbaczewski, A. and Jessup, L. M. (2002). Does electronic
monitoring of employee internet usage work? Com-
munications of the ACM, 45(1):80–83.
Wiggins, J. S. (1996). The five-factor model of personality:
Theoretical perspectives. Guilford Press.
Yarkoni, T. (2010). Personality in 100,000 words: A
large-scale analysis of personality and word use
among bloggers. Journal of research in personality,
44(3):363–373.
ICEIS2015-17thInternationalConferenceonEnterpriseInformationSystems
720