Research Article
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
Table 7
Verifying malicious insider through the concept of information security compliance.
| Construct | Description | Yes / No | Used Words |
| Spreading Knowledge of Information Security | He / She doesn’t want to give knowledge of information security to the other people. | | hell, bad | Others don’t help to improve his / her knowledge of information security. | | | He / She doesn’t like to join a seminar related to information security. | | | Cooperating with Others | Cooperation is unhelpful to decrease the risk of our organization. | | wrong, badly | He / She won’t contribute to improve our organization through cooperation. | | | Learning Information Security | He / She doesn’t want to learn new things. | | old, hate | Accepting new things are not helpful to him / her. | | | Practicing Information Security | His / Her experience can’t affect to organization positively. | | | Experiences don’t motivate him / her. | | | Attachment | He / She doesn’t like to communicate others. | | miss, hate, | He / She doesn’t tend to obey the rules. | | damn, wrong | Commitment | He / She is careless about keeping valuable things safely. | | forgot | He / She doesn’t try to follow up the newest policies. | | weird |
|
|