{"id":"https://openalex.org/W2969058078","doi":"https://doi.org/10.1109/cscwd.2019.8791906","title":"Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry","display_name":"Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2969058078","doi":"https://doi.org/10.1109/cscwd.2019.8791906","mag":"2969058078"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2019.8791906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2019.8791906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058158472","display_name":"Abhishek Mahalle","orcid":null},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Abhishek Mahalle","raw_affiliation_strings":["School of Management and Enterprise, University of Southern Queensland, Toowoomba, Australia"],"affiliations":[{"raw_affiliation_string":"School of Management and Enterprise, University of Southern Queensland, Toowoomba, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012159374","display_name":"Jianming Yong","orcid":"https://orcid.org/0000-0003-4111-1076"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jianming Yong","raw_affiliation_strings":["School of Management and Enterprise, University of Southern Queensland, Toowoomba, Australia"],"affiliations":[{"raw_affiliation_string":"School of Management and Enterprise, University of Southern Queensland, Toowoomba, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065941595","display_name":"Xiaohui Tao","orcid":"https://orcid.org/0000-0002-0020-077X"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaohui Tao","raw_affiliation_strings":["School of Agricultural, Computational and Environmental Sciences, University of Southern Queensland, Toowoomba, Australia"],"affiliations":[{"raw_affiliation_string":"School of Agricultural, Computational and Environmental Sciences, University of Southern Queensland, Toowoomba, Australia","institution_ids":["https://openalex.org/I185523456"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058158472"],"corresponding_institution_ids":["https://openalex.org/I185523456"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.12905338,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"16","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.7491189241409302},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7037612199783325},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6726068258285522},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6383464336395264},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5615529417991638},{"id":"https://openalex.org/keywords/financial-services","display_name":"Financial services","score":0.5517138242721558},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.4068647623062134},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3677535653114319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3407137393951416},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10719379782676697}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.7491189241409302},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7037612199783325},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6726068258285522},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6383464336395264},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5615529417991638},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.5517138242721558},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.4068647623062134},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3677535653114319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3407137393951416},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10719379782676697},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cscwd.2019.8791906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2019.8791906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.usq.edu.au:37973","is_oa":false,"landing_page_url":"http://eprints.usq.edu.au/37973/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400692","display_name":"University of Southern Queensland ePrints (University of Southern Queensland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185523456","host_organization_name":"University of Southern Queensland","host_organization_lineage":["https://openalex.org/I185523456"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item (Commonwealth Reporting Category E)"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1516532723","https://openalex.org/W2007227619","https://openalex.org/W2083829472","https://openalex.org/W2135419790","https://openalex.org/W2483945477","https://openalex.org/W2885988615","https://openalex.org/W3126074005","https://openalex.org/W6630951462"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2286217954"],"abstract_inverted_index":{"Cloud":[0],"architecture":[1],"infrastructure":[2],"for":[3,105],"Banking":[4,37,143],"and":[5,14,32,38,53,61,71,82,93,99,116,138,144],"Financial":[6,39,145],"Services":[7,40,146],"Corporations":[8,41],"operates":[9],"on":[10,23],"access":[11,55],"control":[12,31],"mechanism":[13],"trust":[15],"over":[16],"various":[17,127],"cloud":[18,35,58,64],"user.":[19],"Having":[20],"established":[21],"the":[22,34,44,57,63,78,126],"demand":[24],"service":[25],"delivery":[26],"model":[27],"to":[28,47,68,111],"operate,":[29],"maintain,":[30],"govern":[33],"architecture,":[36],"deliver":[42],"round":[43],"clock":[45],"services":[46],"customers.":[48],"Despite":[49],"stringent":[50],"security":[51],"controls":[52],"minimum":[54],"level,":[56],"users":[59],"identify":[60],"exploit":[62],"vulnerabilities.":[65],"This":[66],"leads":[67],"data":[69],"leakages":[70],"loss":[72],"of":[73,80,114,129,140],"critical":[74],"information.":[75],"Depending":[76],"upon":[77],"area":[79],"business":[81],"sophistication":[83],"with":[84,135],"which":[85],"vulnerabilities":[86],"have":[87,124],"been":[88],"exploited,":[89],"frauds":[90],"are":[91,95],"committed":[92],"system":[94],"damaged":[96],"by":[97],"employees":[98,115],"third":[100,117],"party":[101,118],"contractors.":[102,119],"The":[103],"reason":[104],"such":[106],"exploitation":[107],"ranges":[108],"from":[109],"disgruntlement":[110],"personal":[112],"issues":[113],"In":[120],"this":[121],"paper,":[122],"we":[123],"identified":[125],"types":[128],"insiders,":[130],"their":[131],"motives,":[132],"risk":[133],"associated":[134],"information":[136],"systems":[137],"methods":[139],"mitigation":[141],"in":[142],"Corporations.":[147]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
