Deterrence and prevention-based model to mitigate information security insider threats in organisations

NS Safa, C Maple, S Furnell, MA Azad, C Perera… - Future Generation …, 2019 - Elsevier
Previous studies show that information security breaches and privacy violations are
important issues for organisations and people. It is acknowledged that decreasing the risk in …

Trust Factors and Insider Threats in Permissioned Distributed Ledgers: An Analytical Study and Evaluation of Popular DLT Frameworks

B Putz, G Pernul - Transactions on Large-Scale Data-and Knowledge …, 2019 - Springer
Permissioned distributed ledgers have recently captured the attention of organizations
looking to improve efficiency, transparency and auditability in value network operations …

Insider attacks: Human-factors attacks and mitigation

J Abulencia - Computer Fraud & Security, 2021 - magonlinelibrary.com
For many organisations, the human element is generally the weakest link and often the
reason why many security incidents occur. As an organisation grows, the chance of a human …

Adaptive identity and access management—contextual data based policies

M Hummer, M Kunz, M Netter, L Fuchs… - EURASIP Journal on …, 2016 - Springer
Due to compliance and IT security requirements, company-wide identity and access
management within organizations has gained significant importance in research and …

Mitigating insider threat in cloud relational databases

Q Yaseen, Q Althebyan, B Panda… - Security and …, 2016 - Wiley Online Library
Cloud security has become one of the emergent issues because of the immense growth of
cloud services. A major concern in cloud security is the insider threat because of the harm …

Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders

E Zimmer, C Burkert, H Federrath - Digital Threats: Research and …, 2021 - dl.acm.org
The insider threat is often cited as one of the most challenging threats for security
practitioners. Even though this topic is receiving considerable attention, two main problems …

Advanced identity and access policy management using contextual data

M Hummer, M Kunz, M Netter, L Fuchs… - … , reliability and security, 2015 - ieeexplore.ieee.org
Due to compliance and IT security requirements, company-wide Identity and Access
Management within organizations has gained significant importance in research and …

Towards federated service discovery and identity management in collaborative data and compute cloud infrastructures

S Memon, J Jens, E Willem, H Neukirchen… - Journal of Grid …, 2018 - Springer
This paper compares three multi-national research infrastructures, one that provides data
services, one that provides compute services, and one that supports linguistics research …

Augmenting authentication with context-specific behavioral biometrics

H Zhang, D Singh, X Li - 2019 - scholarspace.manoa.hawaii.edu
Behavioral biometrics, being non-intrusive and cost-efficient, have the potential to assist
user identification and authentication. However, user behaviors can vary significantly for …

Conceptual framework for adaptive access and identity management

S Extros, TN Nisha - AIP Conference Proceedings, 2023 - pubs.aip.org
Access and Identity management have always been the key enablers in connecting the
users with the enterprises, system or networks. As a result of enhancing security culture …