{"id":"https://openalex.org/W2888366561","doi":"https://doi.org/10.1016/s1353-4858(18)30077-1","title":"Overcoming the risks of privileged user abuse in Salesforce","display_name":"Overcoming the risks of privileged user abuse in Salesforce","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2888366561","doi":"https://doi.org/10.1016/s1353-4858(18)30077-1","mag":"2888366561"},"language":"en","primary_location":{"id":"doi:10.1016/s1353-4858(18)30077-1","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(18)30077-1","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017386206","display_name":"Mike Mason","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mike Mason","raw_affiliation_strings":["FairWarning"],"affiliations":[{"raw_affiliation_string":"FairWarning","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5017386206"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3927,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70914516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2018","issue":"8","first_page":"6","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.41440001130104065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.41440001130104065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.650030255317688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.629814863204956},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5827568173408508},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5641723275184631},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5541929006576538},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5321362018585205},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5277577042579651},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4980957508087158},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.4472806453704834},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39293017983436584},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13921800255775452},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11568272113800049},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08619475364685059},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07407644391059875}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.650030255317688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.629814863204956},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5827568173408508},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5641723275184631},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5541929006576538},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5321362018585205},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5277577042579651},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4980957508087158},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.4472806453704834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39293017983436584},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13921800255775452},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11568272113800049},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08619475364685059},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07407644391059875},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s1353-4858(18)30077-1","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(18)30077-1","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W1912565424","https://openalex.org/W4246410201","https://openalex.org/W1968505275","https://openalex.org/W2959939328","https://openalex.org/W2385081216","https://openalex.org/W2392327727"],"abstract_inverted_index":{"Privileged":[0,40,99],"Salesforce":[1,27,41,80],"users":[2,42,72],"are":[3,9,43],"necessary":[4,44],"to":[5,45,53,58,78,117],"every":[6,46],"organisation.":[7,47],"These":[8,70],"members":[10],"of":[11,62,125,135],"your":[12,54,79,83,118],"organisation":[13,84],"who":[14],"have":[15],"more":[16],"advanced":[17,71],"permission":[18],"sets":[19],"than":[20],"the":[21,51,97,121],"average":[22],"user":[23,100],"and":[24,35,68,130],"can":[25,73,90],"include":[26],"admins,":[28],"sales":[29],"reps,":[30],"developers,":[31],"HR":[32],"staff,":[33],"management":[34],"senior":[36],"or":[37,105],"executive":[38],"leadership.":[39],"But":[48],"they":[49,89],"hold":[50],"keys":[52],"kingdom,":[55],"with":[56,120],"access":[57],"a":[59,114],"broad":[60],"array":[61],"company":[63,119],"data,":[64],"security":[65,129],"controls,":[66],"workflows":[67],"resources.":[69],"make":[74],"nearly":[75],"unlimited":[76],"changes":[77],"instance,":[81],"placing":[82],"at":[85],"tremendous":[86],"risk.":[87],"And":[88],"even":[91],"cover":[92],"their":[93],"own":[94],"tracks":[95],"in":[96],"process.":[98],"abuse":[101],"may":[102,107],"be":[103,108],"malicious":[104],"it":[106,112],"unintentional.":[109],"Either":[110],"way,":[111],"represents":[113],"huge":[115],"vulnerability":[116],"two":[122],"main":[123],"areas":[124],"concern":[126],"being":[127],"data":[128],"compliance,":[131],"explains":[132],"Mike":[133],"Mason":[134],"FairWarning.":[136]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
