{"id":1096,"date":"2018-02-26T11:59:04","date_gmt":"2018-02-26T16:59:04","guid":{"rendered":"http:\/\/community.mis.temple.edu\/seminars\/?p=1096"},"modified":"2018-03-26T13:01:43","modified_gmt":"2018-03-26T17:01:43","slug":"h-raghav-rao","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/seminars\/h-raghav-rao\/","title":{"rendered":"March 30 \u2013 H. Raghav Rao to Present \u201cA Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts\u201d"},"content":{"rendered":"<p style=\"text-align: center\"><strong>A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts<\/strong><\/p>\n<p style=\"text-align: center\">by<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/business.utsa.edu\/faculty\/raghav-rao\/\" target=\"_blank\" rel=\"noopener\"><strong>H. Raghav Rao<\/strong><\/a><\/p>\n<div style=\"text-align: center\">AT&amp;T Distinguished Chair in Infrastructure Assurance and Security<\/div>\n<div style=\"text-align: center\">Department of Information Systems and Cyber Security<\/div>\n<div style=\"text-align: center\">College of Business, University of Texas at San Antonio<\/div>\n<p style=\"text-align: center\">Friday, March 30, 2018<\/p>\n<p style=\"text-align: center\">10:30 AM \u2013 noon<\/p>\n<p style=\"text-align: center\">Speakman Hall Suite 200<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p class=\"m_4201483139790201219xmsonormal\">This study investigates employees\u2019 unauthorized access attempts on information systems (IS) applications in a financial institution and how opportunity contexts impact such attempts. By contextualizing multilevel criminal opportunity theory, we develop a model that considers both employee- and department-level opportunity contexts. At the employee level, we hypothesize that the number of IS apps an employee has legitimately accessed and the level of confidentiality of those apps, together with the time when and the location where the employee initiated the access, affect the likelihood of unauthorized attempts. At the department level, we hypothesize that department size moderates the impact of employee-level contextual variables on the likelihood of unauthorized attempts occurring. To test the hypotheses, we collected six months of access log data from an enterprise single sign-on system of a financial institution. We find the hypothesized main effects of all employee-level contextual variables are supported. In addition, department size reinforces the effects of off-hour access, off-site access, and their interaction term. Robustness analyses indicate that the results do not align with employees who do not know the systems well enough and may be making mistakes. We also discuss the theoretical and practical implications of the study.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts by H. Raghav Rao AT&amp;T Distinguished Chair in Infrastructure Assurance and Security Department of Information Systems and Cyber Security College of Business, University of Texas at San Antonio Friday, March 30, 2018 10:30 AM \u2013 noon Speakman Hall Suite 200 [&hellip;]<\/p>\n","protected":false},"author":11079,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16286,783205,783204,783202],"class_list":{"0":"post-1096","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"tag-cyber-security","8":"tag-h-raghav-rao","9":"tag-unauthorized-access-attempts","10":"tag-university-of-texas-at-san-antonio","11":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/users\/11079"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/comments?post=1096"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1096\/revisions"}],"predecessor-version":[{"id":1113,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/1096\/revisions\/1113"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/media?parent=1096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/categories?post=1096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/tags?post=1096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}