- Shuyuan Mary Ho
Florida State University Tallahassee, FL 32306-2100
smho@fsu.edu - Hwajung Lee
Radford University Radford, VA 24142. USA
hlee3@radford.edu
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications
Insider threats are both social and technological phenomena, and group dynamics can provide important indicators to help counter insider threats. This paper discusses an experimental study that simulates insider betrayal in an online collaborative environment. This study uses the framework of trustworthiness attribution, wherein the authors examine the trustworthiness of a focal individual whose role was in leadership with authority within a trusted team arrangement. Specifically, the authors adopted a finite-state machine (FSM) approach to analyzing patterns of a group's emotional states in order to understand how members collectively distinguish insider betrayal through computer-mediated interactions, social connectivity and coordination. Moreover, these conditions help us understand how human observations of betrayal can be leveraged to provide early warnings to betrayal. Of the four simulated case studies conducted, two provide baseline measures, and the other two provide treatment measures. Findings indicate that signs of potential betrayal can be collectively identified by team members through text and behavioral patterns – to uncover social intent that is not explicitly stated.