{"id":"https://openalex.org/W2280722976","doi":"https://doi.org/10.1145/2854152","title":"Behavioral Study of Users When Interacting with Active Honeytokens","display_name":"Behavioral Study of Users When Interacting with Active Honeytokens","publication_year":2016,"publication_date":"2016-02-09","ids":{"openalex":"https://openalex.org/W2280722976","doi":"https://doi.org/10.1145/2854152","mag":"2280722976"},"language":"en","primary_location":{"id":"doi:10.1145/2854152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2854152","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002391103","display_name":"Asaf Shabtai","orcid":"https://orcid.org/0000-0003-0630-4059"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Asaf Shabtai","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045980071","display_name":"Maya Bercovitch","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Maya Bercovitch","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012622155","display_name":"Lior Rokach","orcid":"https://orcid.org/0000-0002-6956-3341"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Lior Rokach","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024303852","display_name":"Kobi Gal","orcid":"https://orcid.org/0000-0001-7187-8572"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ya'akov (Kobi) Gal","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075956753","display_name":"Erez Shmueli","orcid":"https://orcid.org/0000-0003-3193-5768"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Erez Shmueli","raw_affiliation_strings":["Tel-Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Tel-Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5002391103"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":6.2305,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.96203033,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"18","issue":"3","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8499542474746704},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5239593982696533},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.5156339406967163},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.4495507478713989},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.441751092672348},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4255150258541107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4190792739391327},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07769617438316345}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8499542474746704},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5239593982696533},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.5156339406967163},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.4495507478713989},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.441751092672348},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4255150258541107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4190792739391327},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07769617438316345},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2854152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2854152","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W175213186","https://openalex.org/W1517527854","https://openalex.org/W1536598138","https://openalex.org/W1597718979","https://openalex.org/W1665985821","https://openalex.org/W1977776704","https://openalex.org/W1992644805","https://openalex.org/W2032389920","https://openalex.org/W2053266370","https://openalex.org/W2057686088","https://openalex.org/W2088007701","https://openalex.org/W2101173463","https://openalex.org/W2143135888","https://openalex.org/W2151584216","https://openalex.org/W2161125296","https://openalex.org/W2166130504","https://openalex.org/W2513057535","https://openalex.org/W2945608433","https://openalex.org/W3151563051"],"related_works":["https://openalex.org/W4285132775","https://openalex.org/W3167347940","https://openalex.org/W4285172160","https://openalex.org/W2766781562","https://openalex.org/W2976051608","https://openalex.org/W308359497","https://openalex.org/W4285356110","https://openalex.org/W2984000590","https://openalex.org/W3192107850","https://openalex.org/W2488112254"],"abstract_inverted_index":{"Active":[0],"honeytokens":[1,87,110,140,149,180],"are":[2,27,89,112],"fake":[3],"digital":[4],"data":[5,10,19,49,63,173],"objects":[6,11,50],"planted":[7,142],"among":[8],"real":[9,119],"and":[12,59,81,146,176],"used":[13,90],"in":[14,29,91,137,143],"an":[15,79],"attempt":[16],"to":[17,61,107,116,153,178],"detect":[18,154],"misuse":[20,62,174],"by":[21],"insiders.":[22],"In":[23],"this":[24],"article,":[25],"we":[26,77],"interested":[28],"understanding":[30],"how":[31,54,177],"users":[32,46,115,130],"(e.g.,":[33],"employees)":[34],"behave":[35,133],"when":[36,65,135],"interacting":[37],"with":[38],"honeytokens,":[39],"specifically":[40],"addressing":[41],"the":[42,56,72,86,92,99,124,144,165],"following":[43],"questions:":[44],"Can":[45],"distinguish":[47,117],"genuine":[48],"from":[51,118],"honeytokens?":[52,75],"And,":[53],"does":[55],"user's":[57],"behavior":[58,175],"tendency":[60],"change":[64],"he":[66],"or":[67],"she":[68],"is":[69,105],"aware":[70],"of":[71,74,98,123,167],"use":[73],"First,":[76],"present":[78],"automated":[80],"generic":[82],"method":[83],"for":[84,114],"generating":[85],"that":[88,103,111,129,139,147,170,181],"subsequent":[93],"behavioral":[94],"studies.":[95],"The":[96,121],"results":[97,122,158],"first":[100],"study":[101,126],"indicate":[102],"it":[104],"possible":[106],"automatically":[108],"generate":[109,179],"difficult":[113],"tokens.":[120],"second":[125],"unexpectedly":[127],"show":[128],"did":[131],"not":[132],"differently":[134],"informed":[136],"advance":[138],"were":[141],"database":[145],"these":[148],"would":[150],"be":[151],"monitored":[152],"illegitimate":[155],"behavior.":[156],"These":[157],"can":[159],"inform":[160],"security":[161],"system":[162],"designers":[163],"about":[164],"type":[166],"environmental":[168],"variables":[169],"affect":[171],"people's":[172],"evade":[182],"detection.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
