Internal Control of Information Sharing through user Security Behavioural Profiling
Keywords:
information security, human behaviour, personality type, profiling, social, technological, insider threat
Abstract
This paper presents a workable solution to address the human-related information security problem of improper sharing of information by insiders with outsiders or unauthorized insiders This system differs from most currently available information security solutions as in that instead of relying solely on technological security measures it adapts a mixture of social and technological solutions The presented system monitors users security best practices and behavioural patterns and creates user security behavioural profiles and thus identifies users who might potentially pose threats to the organization s information security The system then determines and schedules the security education and training to be given to these users
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2014-01-15
Issue
Section
License
Copyright (c) 2014 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.