Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

The effects of the dark triad on unethical behavior

A Harrison, J Summers, B Mennecke - Journal of Business Ethics, 2018 - Springer
This article uses behavioral theories to develop an ethical decision-making model that
describes how psychological factors affect the development of unethical intentions to commit …

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture

WR Flores, E Antonsen, M Ekstedt - Computers & security, 2014 - Elsevier
This paper presents an empirical investigation on what behavioral information security
governance factors drives the establishment of information security knowledge sharing in …

Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

Detecting insider threat from enterprise social and online activity data

G Gavai, K Sricharan, D Gunning, R Rolleston… - Proceedings of the 7th …, 2015 - dl.acm.org
Insider threat is a significant security risk for organizations. In this paper, we attempt to
discover insider threat by identifying abnormal behavior in enterprise social and online …

The insider threat in cloud computing

M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic
and versatile provision of computational resources and services. Even though the …

User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …

A review of insider threat detection approaches with IoT perspective

A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an
inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …