2009
DOI: 10.1145/1562164.1562198
|View full text |Cite
|
Sign up to set email alerts
|

Overcoming the insider

Abstract: Information security has become increasingly important for organizations, given their dependence on ICT. Not surprisingly, therefore, the external threats posed by hackers and viruses have received extensive coverage in the mass media. Yet numerous security surveys also point to the 'insider' threat of employee computer crime. In 2006, for example, the Global Security Survey by Deloitte reports that 28% of respondent organizations encountered considerable internal computer fraud. This figure may not appear hig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 82 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…In a similar fashion to other industries, the copyright industries are involved in an evolutionary arms race in the protection of intellectual property (IP) from release groups-as industry develops new technologies to prevent the illicit copying of their IP, crackers soon develop methods to circumvent them (Goode and Cruise 2006, 173). 3 Scholars have suggested methods of protecting industry from insider leaks of IP (Willison and Siponen 2009;Willison 2006;Willison and Backhouse 2006;Stephenson 2005), as well as developments in Digital Rights Management (DRM) technologies-tools used to ensure copyright compliance (Hunter 2004). Scholars have also developed formalized theoretical frameworks for studying piracy, with the intention of seeking methods to reduce opportunities for individuals to offend (Holsapple et al 2008;Willison and Siponen 2008).…”
Section: Introductionmentioning
confidence: 99%
“…In a similar fashion to other industries, the copyright industries are involved in an evolutionary arms race in the protection of intellectual property (IP) from release groups-as industry develops new technologies to prevent the illicit copying of their IP, crackers soon develop methods to circumvent them (Goode and Cruise 2006, 173). 3 Scholars have suggested methods of protecting industry from insider leaks of IP (Willison and Siponen 2009;Willison 2006;Willison and Backhouse 2006;Stephenson 2005), as well as developments in Digital Rights Management (DRM) technologies-tools used to ensure copyright compliance (Hunter 2004). Scholars have also developed formalized theoretical frameworks for studying piracy, with the intention of seeking methods to reduce opportunities for individuals to offend (Holsapple et al 2008;Willison and Siponen 2008).…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, SCP is widely used to combat non-traditional crimes such as wildlife crime (Pires and Clarke 2011;Kurland et al 2017;Moreto and Gau 2017;Burton et al 2020), terrorism (Clarke and Newman 2009;Mandala and Freilich 2018;Freilich et al 2019), and maritime piracy (Shane et al 2015(Shane et al , 2018. Given the successful implementation of SCP by many governments and its wide adoption in dealing with a variety of traditional and non-traditional crimes, it is unsurprising that there is growing interests in using SCP to prevent cybercrimes (Willison 2000;Beebe and Rao 2005;Willison and Siponen 2009;Hinduja and Kooi 2013;Padayachee 2015;Ho et al 2022). Brewer et al (2019) argue that it is unclear whether SCP interventions can prevent cybercrime effectively.…”
Section: Research Development Of Place Managersmentioning
confidence: 99%
“…Based on the matrix of 25 techniques (Cornish & Clarke, 2003), some authors developed an adapted version for insider incidents. With the help of a crime script, a theoretical paper suggests a set of measures aimed mainly at increasing the effort insiders must make and the risk they must take to cause an incident, such as using passwords for specific programs and auditing computer logs (Willison & Siponen, 2009). Building on this work, another theoretical paper proposes a broad list of security measures for 22 of the 25 techniques.…”
Section: Insiders Insider Incidents and Cyber Security Measuresmentioning
confidence: 99%