{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:52:56Z","timestamp":1729626776571,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641060","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:20:04Z","timestamp":1383074404000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A conceptual opportunity-based framework to mitigate the insider threat"],"prefix":"10.1109","author":[{"given":"Keshnee","family":"Padayachee","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Honeypots Part 4 Liability and Ethics of Honeypots","year":"2003","author":"kabay","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.29"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.172"},{"journal-title":"Honeypots Are They Illegal?","year":"2010","author":"spitzner","key":"34"},{"key":"39","article-title":"An insider threat model for adversary simulation","author":"wood","year":"2000","journal-title":"Proceedings of the Research on Mitigating the Insider Threat to Information Systems"},{"key":"37","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10207-012-0165-6","article-title":"Insider threat mitigation: Preventing unauthorized knowledge acquisition","volume":"11","author":"quassai","year":"2012","journal-title":"International Journal of Information Security"},{"journal-title":"E-Business Security in RAG order Dublin Institute of Technology Dublin Ireland","year":"2003","author":"gardiner","key":"38"},{"key":"43","article-title":"Disclosure of organizational information by employees on facebook: Looking at the potential for information security risks","author":"nuha","year":"2011","journal-title":"Proceedings of the Australasian Conference on Information Systems (ACIS)"},{"key":"42","article-title":"Understanding the factors of information leakage through online social networking to safeguard organizational information","author":"molok","year":"2010","journal-title":"21st Australasian Conference on Information Systems (ACIS2010)"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/BF02242925"},{"key":"40","article-title":"Baiting inside attackers using decoy documents","author":"bowen","year":"2009","journal-title":"Security and Privacy in Communication Networks 5th International ICST Conference (SecureComm 2009)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1177\/147737080556056"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.109"},{"key":"24","article-title":"Insider threat control: Understanding data loss prevention (dlp) and detection by correlating events from multiple sources (technical report)","author":"silowash","year":"2013","journal-title":"Software Engineering Institute Carnegie Mellon University"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.654318"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01009-X"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00109-8"},{"key":"29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/978-3-642-15152-1_3","article-title":"An insider threat prediction model","volume":"6264","author":"kandias","year":"2010","journal-title":"Trust Privacy and Security in Digital Business"},{"key":"3","first-page":"4","article-title":"Insiders and insider threats-an overview of definitions and mitigation techniques","volume":"2","author":"hunker","year":"2011","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.003"},{"journal-title":"2011 Cybersecurity Watch Survey Organizations Need More Skilled Cyber Professionals to Stay Secure","year":"2011","key":"1"},{"key":"7","first-page":"41","article-title":"Opportunities, precipitators and criminal decisions: A reply to Wortley's critique of situational crime prevention","volume":"16","author":"cornish","year":"2003","journal-title":"Crime prevention studies"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2005.11.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.231"},{"key":"5","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","article-title":"A survey of insider attack detection research: Beyond the Hacker","volume":"39","author":"salem","year":"2008","journal-title":"Insider Attack and Cyber Security"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254322"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.94"},{"key":"31","first-page":"13","article-title":"Combining baiting and user search profiling techniques for masquerade detection","volume":"3","author":"salem","year":"2012","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications (JoWUA)"},{"key":"9","first-page":"1","article-title":"Opportunity makes the thief: Practical theory for crime prevention (police research series paper 98)","author":"felson","year":"1998","journal-title":"Policing and Reducing Crime Unit Research Development and Statistics Directorate"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.05.002"},{"key":"19","article-title":"Using situational crime prevention theory to explain the effectiveness of information systems security","author":"beebe","year":"2005","journal-title":"Proceedings of the 2005 SoftWars Conference"},{"journal-title":"Cyber-crime Science = Crime Science + Information Security","year":"2010","author":"hartel","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1562164.1562198"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.12.005"},{"key":"16","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"bulgurcu","year":"2010","journal-title":"MIS Quarterly"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198263982.003.0001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1086\/259394"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"12","first-page":"78","article-title":"Crime pattern theory","author":"brantingham","year":"2008","journal-title":"Environmental Criminology and Crime Analysis"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.08.001"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.17705\/1CAIS.02617","article-title":"Improving organizational information security strategy via meso-level application of situation crime prevention to the risk management process","volume":"26","author":"beebe","year":"2010","journal-title":"Communications of The Association for Information Systems"},{"key":"49","first-page":"55","article-title":"Situational deterrence: Fear during the criminal event","volume":"1","author":"cusson","year":"1993","journal-title":"Crime prevention studies"},{"journal-title":"Great Pretenders Pursuits and Careers of Persistent Thieves","year":"1996","author":"shover","key":"48"},{"key":"45","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1057\/palgrave.sj.8340098","article-title":"A classification of techniques for controlling Situational Precipators of Crime","volume":"14","author":"wortley","year":"2001","journal-title":"Security Journal"},{"journal-title":"An Aspect-oriented Approach Towards Enhancing Optimistic Access Control with Usage Control","year":"2009","author":"padayachee","key":"44"},{"key":"47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1086\/652208","article-title":"Understanding desistance from crime","author":"laub","year":"2001","journal-title":"Crime and Justice"},{"key":"46","article-title":"Why johnny can't encrypt: A usability evaluation of PGP 5. 0","author":"whitten","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1086\/449106"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1201\/9781439833032.ch102"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.008"},{"journal-title":"Criminology Theory Research and Policy","year":"2006","author":"vito","key":"53"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.23"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641060.pdf?arnumber=6641060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T09:10:48Z","timestamp":1564564248000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641060","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}