Internal Control of Information Sharing through user Security Behavioural Profiling

α
Suchinthi Fernando
Suchinthi Fernando
σ
Takashi Yukawa
Takashi Yukawa
α Nagaoka University of Technology Nagaoka University of Technology

Send Message

To: Author

Internal Control of Information Sharing through user Security Behavioural Profiling

Article Fingerprint

ReserarchID

U55ZU

Internal Control of Information Sharing through user Security Behavioural Profiling Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

This paper presents a workable solution to address the human-related information security problem of improper sharing of information by insiders with outsiders or unauthorized insiders. This system differs from most currently available information security solutions as in that, instead of relying solely on technological security measures it adapts a mixture of social and technological solutions. The presented system monitors users’ security best practices and behavioural patterns and creates user security behavioural profiles and thus identifies users who might potentially pose threats to the organization’s information security. The system then determines and schedules the security education and training to be given to these users.

References

17 Cites in Article
  1. T Asai (2007). Information security and business activities.
  2. J Schweitzer (1996). Protecting business information.
  3. M Bean (2008). Verizon: External breaches more common.
  4. B Schneier (2008). the psychology of security.
  5. B Williams (2011). do it differently.
  6. David Lynch (2006). Securing Against Insider Attacks.
  7. A Liu (2005). a comparison of system call feature representations for insider threat detection.
  8. R Mills (2011). A scenario-based approach to mitigating the insider threat.
  9. C Vroom,R Solms (2003). Information Security: Auditing the behaviour of the employee.
  10. R Sabett (2011). Have you seen the latest and greatest "security game changer.
  11. T Peltier (2002). Information security policies, procedures and standards: guidelines for effective information security management.
  12. J Gonzalez,A Sawicka (2002). a framework for human factors in information security.
  13. K Foley (2011). Maintaining a proactive and sustainable security programme while hosting and processing personally identifiable information.
  14. S Fernando,T Yukawa (2013). Internal control of secure information and communication practices through detection of user behavioural patterns.
  15. D Lacey (2009). Managing the human factor in information security: how to win over staff and influence business.
  16. T Young,S Varano (2006). Profiling pros and cons: an evaluation of contemporary criminal profiling methodologies.
  17. M Thompson (2011). Functional Analysis: Behavioural Options in Relationship.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Suchinthi Fernando. 2014. \u201cInternal Control of Information Sharing through user Security Behavioural Profiling\u201d. Global Journal of Human-Social Science - C: Sociology & Culture GJHSS-C Volume 14 (GJHSS Volume 14 Issue C1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Version of record

v1.2

Issue date

April 19, 2014

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 4749
Total Downloads: 2356
2026 Trends
Related Research

Published Article

This paper presents a workable solution to address the human-related information security problem of improper sharing of information by insiders with outsiders or unauthorized insiders. This system differs from most currently available information security solutions as in that, instead of relying solely on technological security measures it adapts a mixture of social and technological solutions. The presented system monitors users’ security best practices and behavioural patterns and creates user security behavioural profiles and thus identifies users who might potentially pose threats to the organization’s information security. The system then determines and schedules the security education and training to be given to these users.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Internal Control of Information Sharing through user Security Behavioural Profiling

Suchinthi Fernando
Suchinthi Fernando Nagaoka University of Technology
Takashi Yukawa
Takashi Yukawa

Research Journals