Research Article

Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media

Table 7

Verifying malicious insider through the concept of information security compliance.

ConstructDescriptionYes / NoUsed Words

Spreading Knowledge of Information SecurityHe / She doesn’t want to give knowledge of information security to the other people.hell, bad
Others don’t help to improve his / her knowledge of information security.
He / She doesn’t like to join a seminar related to information security.
Cooperating with OthersCooperation is unhelpful to decrease the risk of our organization.wrong, badly
He / She won’t contribute to improve our organization through cooperation.
Learning Information SecurityHe / She doesn’t want to learn new things.old, hate
Accepting new things are not helpful to him / her.
Practicing Information SecurityHis / Her experience can’t affect to organization positively.
Experiences don’t motivate him / her.
AttachmentHe / She doesn’t like to communicate others.miss, hate,
He / She doesn’t tend to obey the rules.damn, wrong
CommitmentHe / She is careless about keeping valuable things safely.forgot
He / She doesn’t try to follow up the newest policies.weird