{"id":"https://openalex.org/W2612481008","doi":"https://doi.org/10.1007/978-3-319-58460-7_21","title":"System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis","display_name":"System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2612481008","doi":"https://doi.org/10.1007/978-3-319-58460-7_21","mag":"2612481008"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-58460-7_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58460-7_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038378458","display_name":"Tesleem Fagade","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tesleem Fagade","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025514379","display_name":"Theodoros Spyridopoulos","orcid":"https://orcid.org/0000-0001-7575-9909"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theo Spyridopoulos","raw_affiliation_strings":["Cybersecurity Research Unit, University of the West of England, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Unit, University of the West of England, Bristol, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077378188","display_name":"Nabeel Albishry","orcid":"https://orcid.org/0000-0002-1231-4491"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nabeel Albishry","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084471326","display_name":"Theo Tryfonas","orcid":"https://orcid.org/0000-0003-4024-8003"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Theo Tryfonas","raw_affiliation_strings":["Cryptography Group, University of Bristol, Bristol, UK","University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084471326"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.9101,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7441732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"309","last_page":"321"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.8746495842933655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7664927244186401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6844335794448853},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6804598569869995},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6000949740409851},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48791906237602234},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4432019591331482},{"id":"https://openalex.org/keywords/personality","display_name":"Personality","score":0.4104142487049103},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.36428624391555786},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12903279066085815}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.8746495842933655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7664927244186401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6844335794448853},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6804598569869995},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6000949740409851},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48791906237602234},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4432019591331482},{"id":"https://openalex.org/C187288502","wikidata":"https://www.wikidata.org/wiki/Q641118","display_name":"Personality","level":2,"score":0.4104142487049103},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.36428624391555786},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12903279066085815},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-58460-7_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58460-7_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:153611","is_oa":false,"landing_page_url":"https://orca.cardiff.ac.uk/id/eprint/153611/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/c349b1de-9e9f-4439-ba35-7ccf10cf12c5","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/c349b1de-9e9f-4439-ba35-7ccf10cf12c5","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fagade, T, Spyridopoulos, T, Albishry, N & Tryfonas, T 2017, System dynamics approach to malicious insider cyber-threat modelling and analysis. in Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. vol. 10292 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10292 LNCS, Springer-Verlag Berlin, pp. 309-321. https://doi.org/10.1007/978-3-319-58460-7_21","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/c349b1de-9e9f-4439-ba35-7ccf10cf12c5","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/c349b1de-9e9f-4439-ba35-7ccf10cf12c5","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fagade, T, Spyridopoulos, T, Albishry, N & Tryfonas, T 2017, System dynamics approach to malicious insider cyber-threat modelling and analysis. in Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. vol. 10292 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10292 LNCS, Springer-Verlag Berlin, pp. 309-321. https://doi.org/10.1007/978-3-319-58460-7_21","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W13970602","https://openalex.org/W61534595","https://openalex.org/W127995660","https://openalex.org/W1492667596","https://openalex.org/W1517229207","https://openalex.org/W1572811218","https://openalex.org/W1654306951","https://openalex.org/W1977969944","https://openalex.org/W1992953884","https://openalex.org/W1993647699","https://openalex.org/W2000278590","https://openalex.org/W2002997376","https://openalex.org/W2006376235","https://openalex.org/W2012610990","https://openalex.org/W2024190895","https://openalex.org/W2027115557","https://openalex.org/W2060821979","https://openalex.org/W2077197861","https://openalex.org/W2096632950","https://openalex.org/W2097623840","https://openalex.org/W2123521920","https://openalex.org/W2129594729","https://openalex.org/W2137351972","https://openalex.org/W2154543747","https://openalex.org/W2159855467","https://openalex.org/W2190692258","https://openalex.org/W2394959616","https://openalex.org/W2477168915","https://openalex.org/W2532755691","https://openalex.org/W2560387703","https://openalex.org/W2603273327","https://openalex.org/W2612926688","https://openalex.org/W2614773713","https://openalex.org/W4231625493","https://openalex.org/W4247092506"],"related_works":["https://openalex.org/W181780664","https://openalex.org/W1986566755","https://openalex.org/W2961395583","https://openalex.org/W2101173463","https://openalex.org/W2886566865","https://openalex.org/W2411226021","https://openalex.org/W308359497","https://openalex.org/W3202582978","https://openalex.org/W78262349","https://openalex.org/W2564638265"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
