{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T21:12:25Z","timestamp":1722460345793},"reference-count":17,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":27,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1016\/j.procs.2021.01.316","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T02:07:37Z","timestamp":1614046057000},"page":"1187-1195","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"C","title":["A Structured Control Selection Methodology for Insider Threat Mitigation"],"prefix":"10.1016","volume":"181","author":[{"given":"Puloma","family":"Roy","sequence":"first","affiliation":[]},{"given":"Anirban","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Chandan","family":"Mazumdar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2021.01.316_bib1","unstructured":"\u201c2017 U.S. State of Cybercrime Executive Summary\u201d, IDG Communications, 31st October, 2017. Retrieved from: https:\/\/www.idg.com\/tools-for-marketers\/2017-u-s-state-cybercrime-executive-summary\/. Accessed: 1st June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib2","unstructured":"\u201c2019 Insider Threat Report\u201d, Cybersecurity Insiders, 2019. Retrieved from: https:\/\/www.cybersecurity-insiders.com\/portfolio\/insider-threat-report\/. Accessed: 3rd June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib3","unstructured":"International Organization for Standardization. (2013). \u201cInformation Technology - Security techniques - Code of practice for information security management\u201d, ISO\/IEC 27002:2013, 1st October, 2013."},{"key":"10.1016\/j.procs.2021.01.316_bib4","unstructured":"National Institute of Standards and Technology. (2013) \u201cSecurity and Privacy Controls for Federal Information Systems and Organizations\u201d, NIST Special Publication 800-53 Revision 4, April 2013."},{"key":"10.1016\/j.procs.2021.01.316_bib5","unstructured":"CERT National Insider Threat Center. (2018) \u201cCommon Sense Guide to Mitigating Insider Threats\u201d, 6th edition, CMU-SEI, December 2018. Retrieved from: https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2019_005_001_540647.pdf. Accessed: 4th June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib6","unstructured":"European Union. (2018). \u201cGeneral Data Protection Regulation (GDPR)\u201d, May 2018."},{"key":"10.1016\/j.procs.2021.01.316_bib7","unstructured":"Balaji Balakrishnan. (2019). \u201cInsider Threat Mitigation Guidance\u201d, SANS Institute, 9th October, 2015. Retrieved from: https:\/\/www.sans.org\/reading-room\/whitepapers\/monitoring\/paper\/36307. Accessed: 1st June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib8","unstructured":"INSA. (2017). \u201cInsider Threat Program Roadmap\u201d, 8th February, 2017. Retrieved from: https:\/\/www.insaonline.org\/insider-threat-roadmap. Accessed: 3rd June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib9","unstructured":"Randy Trzeciak and Dan Costa. (2018) \u201cA Framework to Effectively Develop Insider Threat Controls\u201d, RSA Conference. San Francisco, April 16-20, 2018."},{"key":"10.1016\/j.procs.2021.01.316_bib10","unstructured":"Michael R. Grimaila. (2010) \u201cLog Analysis for Insider Threat Detection\u201d, Cyber Security Expo, University of Memphis. 15th Oct, 2010."},{"key":"10.1016\/j.procs.2021.01.316_bib11","series-title":"\"A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes\"","author":"Bunn","year":"2014"},{"key":"10.1016\/j.procs.2021.01.316_bib12","unstructured":"\u201cNational Insider Threat Policy\u201d, National Insider Threat Task Force (NITTF), November 2012. Retrieved from: https:\/\/www.dni.gov\/files\/NCSC\/documents\/nittf\/National_Insider_Threat_Policy.pdf. Accessed: 3rd June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib13","unstructured":"Derrick Spooner, George Silowash, Daniel Costa and Michael Albrethsen. (2018) \u201cNavigating The Insider Threat Tool Landscape: Low Cost Technical Solutions To Jump-Start An Insider Threat Program\u201d CMU-SEI, June 2018. Retrieved from: https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2018_019_001_521706.pdf. Accessed: 5th June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib14","unstructured":"ENISA (2016). \u201cThreat Taxonomy\u201d, September 2016. Retrieved from: https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/threats-and-trends\/enisa-threat-landscape\/threat-taxonomy\/view. Accessed: 5th June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib15","unstructured":"National Institute of Standards and Technology. (2020) \u201cNational Vulnerability Database\u201d, Information Technology Laboratory. Retrieved from: https:\/\/nvd.nist.gov\/. Accessed: 15th June, 2020."},{"key":"10.1016\/j.procs.2021.01.316_bib16","unstructured":"International Organization for Standardization. (2018). \u201cInformation Technology - Security techniques - Information security risk management\u201d, ISO\/IEC 27005:2018, July 2018."},{"key":"10.1016\/j.procs.2021.01.316_bib17","unstructured":"ISACA. (2012) \u201cA Business Framework for the Governance and Management of Enterprise IT\u201d, COBIT 5."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921003677?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921003677?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T22:32:44Z","timestamp":1615847564000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050921003677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":17,"alternative-id":["S1877050921003677"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.316","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Structured Control Selection Methodology for Insider Threat Mitigation","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.316","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}