Article Fingerprint
ReserarchID
U55ZU
This paper presents a workable solution to address the human-related information security problem of improper sharing of information by insiders with outsiders or unauthorized insiders. This system differs from most currently available information security solutions as in that, instead of relying solely on technological security measures it adapts a mixture of social and technological solutions. The presented system monitors users’ security best practices and behavioural patterns and creates user security behavioural profiles and thus identifies users who might potentially pose threats to the organization’s information security. The system then determines and schedules the security education and training to be given to these users.
Suchinthi Fernando. 2014. \u201cInternal Control of Information Sharing through user Security Behavioural Profiling\u201d. Global Journal of Human-Social Science - C: Sociology & Culture GJHSS-C Volume 14 (GJHSS Volume 14 Issue C1): .
Crossref Journal DOI 10.17406/GJHSS
Print ISSN 0975-587X
e-ISSN 2249-460X
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 147
Country: Japan
Subject: Global Journal of Human-Social Science - C: Sociology & Culture
Authors: Suchinthi Fernando, Takashi Yukawa (PhD/Dr. count: 0)
View Count (all-time): 150
Total Views (Real + Logic): 4749
Total Downloads (simulated): 2356
Publish Date: 2014 04, Sat
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
This paper presents a workable solution to address the human-related information security problem of improper sharing of information by insiders with outsiders or unauthorized insiders. This system differs from most currently available information security solutions as in that, instead of relying solely on technological security measures it adapts a mixture of social and technological solutions. The presented system monitors users’ security best practices and behavioural patterns and creates user security behavioural profiles and thus identifies users who might potentially pose threats to the organization’s information security. The system then determines and schedules the security education and training to be given to these users.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.