Call for Papers
Counter-Insider Threat Research and Practice (CITRAP)
Editor-in-Chief:
Frank L. Greitzer, Ph.D.
Associate Editors:
William R. Claycomb, Ph.D.
Deborah Loftis, Ph.D.
Christine Noonan, LP.D.
Matthew Schumacher, Ph.D.
Look here for information on future issues or special topics for Counter-Insider Threat Research and Practice (CITRAP)
Description
Insider threat risk refers to the potential for a person who is trusted by an organization to intentionally or unintentionally act in a way that harms others, the organization, or its assets. The insider threat is a persistent problem across government, academic, and private sectors. Research to counter insider threats has traditionally focused on insiders’ misuse of technology, tools, and data, and on ways to leverage the same resources to detect and mitigate these incidents. Recently, however, there has been interest in expanding the mission space to focus attention on prevention and ways to counter both malicious and accidental insider threat incidents through strategies that promote individual and organizational wellness, protection, and health.
The social and behavioral sciences (SBS) are well-suited to contribute to this emergent counter-insider threat mission space because of its comprehensive approach to understanding human behavior and the social and cultural context in which that behavior occurs. Therefore, in cooperation with the National Insider Threat Task Force (NITTF) and the Department of Defense’s Counter-Insider Threat Program, The Threat Lab is proud to launch a new online, unclassified peer-reviewed journal to promulgate evidence-based research within the broader counter-insider threat community.
Counter-Insider Threat Research and Practice (CITRAP) will be accessible to the global counter-insider threat community of practice. The journal’s objectives are to: (a) champion the relevance and importance of multi-disciplinary SBS research to the counter-insider threat mission space; (b) communicate practical and theoretical advances concerning insider threat; and (c) improve the translation of SBS counter-insider threat research into evidence-based practice. The first issue is set to be published in late spring/early summer of 2022.
To meet these objectives, the CITRAP journal will provide a unique blend of pioneering research and sound advice for practitioners who create and manage counter-insider threat programs. This will be accomplished through two submission formats, one dedicated to original research and the other to practical tips. This call for papers describes the types of questions that submissions may substantiate as they relate to each journal section.
-
Original Research. Original research submissions include empirical research, quantitative systematic approaches, or scholarly integrations or reviews of previous research that provide new insights to the counter-insider threat community. Submissions are welcome for several broad topic areas. Within each broad topic area, the Editor-in-Chief offers possible research questions to answer, but submissions are not limited to these suggestions. Both empirical and conceptual submissions are encouraged.
- The application of existing social and behavioral science models, methods, and concepts as they relate to intentional and unintentional insider threat and counter-insider threat activities. One of the goals of this journal is to bridge the gap between concepts or models related to insider threat that are commonly presented in SBS publications with those traditionally published in information assurance, security, and cybersecurity sources. One possible research avenue is to consider how SBS concepts compare to current concepts or models used in insider threat research. Submissions of this nature should remark on how insider threat research can advance from the application or understanding of SBS concepts and their associated models. Example questions to answer include: What are the implications of a theoretical model incorporating SBS constructs for future counter-insider threat practice and policy, and theoretical models of insider threat? How does this idea, approach, or model exploit SBS research and complement or conflict with existing insider threat research?
- Sociotechnical factors that correlate with intentional and unintentional threat events and can inform counter-insider threat activities. For example:
- Individual differences in the detection and mitigation of intentional and unintentional threat. Individual differences refer to enduring characteristics that are generally stable across time and situations (e.g., personality). Within the SBS literature, individual difference studies are plentiful. Submissions in this category could address (a) how individual differences can (or cannot) be used to detect intentional and unintentional insider threat and (b) accompanying implications for counter-insider threat activities and other human capital systems (e.g., selection, training).
- Organizational factors that contribute to the occurrence of threat events. Organizational factors that are associated with organizational outcomes are well known. Submissions to this category may examine environmental factors at work (e.g., rewards systems, shared perceptions, organizational culture), the work context itself (e.g., nature of task work, remote work and work from home, technical infrastructure), and their accompanying impact on intentional or unintentional threat events. Importantly, aspects of the work environment can be measured at different levels (e.g., psychological climate, team climate) so submissions of this nature should specify the target level(s) of measurement (e.g., individual, department, organization).
- Advances in analytics and modeling for combatting insider threat. Submissions may indicate how advances in methods or analytics (e.g., Machine Learning, Natural Language Processing) or other novel techniques and new technologies can be applied to counter-insider threat activities by incorporating behavioral modeling to identify behaviors of concern; identifying insider attack patterns; or by offering a demonstration through simulation or other application. Submissions should describe how advances in these methods support or extend traditional methods (and associated findings).
- Systems or societal-level factors that are related to the occurrence of threat events. Submissions should incorporate a sociological or anthropological approach to answer why intentional and unintentional insider threat events occur. Submissions might include concepts that relate to cultural differences, economic disparity, regional influences, political climate, governance, and so forth. Submissions could use case examples of societal factors as they relate to insider threat occurrence and offer ways to detect or mitigate intentional or unintentional threat events in light of these factors.
- Evaluations of the effectiveness of counter-insider threat programs, including intervention strategies and metrics. Submissions could respond to research questions like: What SBS workplace intervention strategies could mitigate intentional and unintentional insider threats? Submissions should present one of the following: (a) a theoretical rationale for new counter-insider threat intervention strategies, (b) a case study that illustrates a new intervention strategy, or (c) an empirical comparison of intervention strategies for mitigating threat events.
-
Scholarship in Practice: Submissions should have a practitioner-focus and may describe new research avenues or compelling advances in the field with immediate impact to counter-insider threat research or practice. Authors chould offer recommendations for implementing a specfic program in other organizations or sectors along with any caveats to consider in its implementation. Submissions should answer questions like: Following an insider threat incident, what were the lessons learned and how would you prevent a similar situation in the future? In establishing a new Counter-Insider Threat program, what are some important pieces of information to consider (e.g., user acceptance)?
Submission guidelines and formatting standards can be found on the For Authors page.
Submissions will undergo an editorial review by an Associate Editor and three ad hoc reviewers. Final decisions will be made by the Editor-in-Chief. Look here for information on future issues or special topics for Counter-Insider Threat Research and Practice (CITRAP).
For questions concerning this call for papers, please contact CITRAP.