LEVERAGING BEHAVIOUR SEQUENCE ANALYSIS (BSA) IN INFORMATION SYSTEMS: EXAMINING MALICIOUS INSIDER THREAT AS AN EXAMPLE

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Abstract

This paper explores the application of Behaviour Sequence Analysis (BSA) in Information Systems (IS) research. BSA is a methodological approach originating from criminology that examines the temporal order and structure of behaviours to uncover patterns. This paper argues for its utility in IS research, particularly in examining socio-technical challenges that involve temporal dynamics. Drawing from a previous application to an IS problem on insider threat, the paper illustrates how BSA can uncover complex behavioural pathways, combining technical and human factors. Beyond insider threats, this paper highlights the potential of BSA to optimise workflows in enterprise systems, enhance ransomware detection, and analyse user interactions with IS platforms. By bridging IS's technical and social dimensions, BSA offers researchers a dynamic and innovative tool to tackle some of the field's most pressing challenges.

Original languageEnglish
Title of host publicationProceedings of The International Conferences, IADIS Information Systems 2025 and e-Society 2025
EditorsMiguel Baptista Nunes, Pedro Isaias, Philip Powell, Piet Kommers
Place of PublicationPortugal
PublisherIADIS Press
Pages517-521
Number of pages5
ISBN (Electronic)9789898704658
Publication statusPublished - 2025
EventInternational Conferences IADIS Information Systems 2025 and 23rd International Conference on e-Society 2025 - Madeira Island, Portugal
Duration: 1 Mar 20253 Mar 2025
Conference number: 18th
https://www.iadisportal.org/is-es-2025-proceedings (Proceedings)

Conference

ConferenceInternational Conferences IADIS Information Systems 2025 and 23rd International Conference on e-Society 2025
Abbreviated titleIE ES 2025
Country/TerritoryPortugal
CityMadeira Island
Period1/03/253/03/25
Internet address

Keywords

  • Behaviour Sequence Analysis
  • Cybersecurity
  • Healthcare
  • Information Systems
  • Insider Threat
  • Work Efficiency

Cite this