{"id":"https://openalex.org/W3045635152","doi":"https://doi.org/10.3390/sym12081255","title":"Study on Inside Threats Based on Analytic Hierarchy Process","display_name":"Study on Inside Threats Based on Analytic Hierarchy Process","publication_year":2020,"publication_date":"2020-07-29","ids":{"openalex":"https://openalex.org/W3045635152","doi":"https://doi.org/10.3390/sym12081255","mag":"3045635152"},"language":"en","primary_location":{"id":"doi:10.3390/sym12081255","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12081255","pdf_url":"https://www.mdpi.com/2073-8994/12/8/1255/pdf","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/12/8/1255/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073772819","display_name":"Sang Seo","orcid":"https://orcid.org/0000-0003-1524-3710"},"institutions":[{"id":"https://openalex.org/I28615091","display_name":"Kyonggi University","ror":"https://ror.org/032xf8h46","country_code":"KR","type":"education","lineage":["https://openalex.org/I28615091"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sang Seo","raw_affiliation_strings":["Department of Computer Science, Kyonggi University, 16227, Gyeonggi-do 154-42, Korea"],"raw_orcid":"https://orcid.org/0000-0003-1524-3710","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kyonggi University, 16227, Gyeonggi-do 154-42, Korea","institution_ids":["https://openalex.org/I28615091"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100686003","display_name":"Dohoon Kim","orcid":"https://orcid.org/0000-0001-6370-9744"},"institutions":[{"id":"https://openalex.org/I28615091","display_name":"Kyonggi University","ror":"https://ror.org/032xf8h46","country_code":"KR","type":"education","lineage":["https://openalex.org/I28615091"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Dohoon Kim","raw_affiliation_strings":["Department of Computer Science, Kyonggi University, 16227, Gyeonggi-do 154-42, Korea"],"raw_orcid":"https://orcid.org/0000-0001-6370-9744","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kyonggi University, 16227, Gyeonggi-do 154-42, Korea","institution_ids":["https://openalex.org/I28615091"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100686003"],"corresponding_institution_ids":["https://openalex.org/I28615091"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":1.9488,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89651991,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"12","issue":"8","first_page":"1255","last_page":"1255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.900625467300415},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.8523423671722412},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6700202822685242},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6521579027175903},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.555016279220581},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5447152853012085},{"id":"https://openalex.org/keywords/analytic-hierarchy-process","display_name":"Analytic hierarchy process","score":0.5384725332260132},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.45392438769340515},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4346107840538025},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3335413932800293},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.25797349214553833},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.23008078336715698},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09932196140289307}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.900625467300415},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.8523423671722412},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6700202822685242},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6521579027175903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.555016279220581},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5447152853012085},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.5384725332260132},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.45392438769340515},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4346107840538025},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3335413932800293},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25797349214553833},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.23008078336715698},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09932196140289307},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym12081255","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12081255","pdf_url":"https://www.mdpi.com/2073-8994/12/8/1255/pdf","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:970ed0498a9f41a3a11282598096f5da","is_oa":true,"landing_page_url":"https://doaj.org/article/970ed0498a9f41a3a11282598096f5da","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 12, Iss 8, p 1255 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/12/8/1255/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym12081255","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym12081255","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym12081255","pdf_url":"https://www.mdpi.com/2073-8994/12/8/1255/pdf","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3045635152.pdf","grobid_xml":"https://content.openalex.org/works/W3045635152.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W1458873377","https://openalex.org/W1481547447","https://openalex.org/W1572811218","https://openalex.org/W1654306951","https://openalex.org/W1980166725","https://openalex.org/W2025519999","https://openalex.org/W2034960640","https://openalex.org/W2035686709","https://openalex.org/W2051131064","https://openalex.org/W2053003065","https://openalex.org/W2061210554","https://openalex.org/W2083260549","https://openalex.org/W2099420981","https://openalex.org/W2100976923","https://openalex.org/W2113484497","https://openalex.org/W2118831445","https://openalex.org/W2130155141","https://openalex.org/W2144584907","https://openalex.org/W2161754059","https://openalex.org/W2166311720","https://openalex.org/W2204591661","https://openalex.org/W2258696461","https://openalex.org/W2397065307","https://openalex.org/W2471273676","https://openalex.org/W2530000518","https://openalex.org/W2740755977","https://openalex.org/W2761599262","https://openalex.org/W2781956102","https://openalex.org/W2787099510","https://openalex.org/W2795060553","https://openalex.org/W2919358988","https://openalex.org/W2963912653","https://openalex.org/W2976051608","https://openalex.org/W2997990748","https://openalex.org/W3015464542","https://openalex.org/W3124215730","https://openalex.org/W4288083473","https://openalex.org/W6601460426","https://openalex.org/W6659242928","https://openalex.org/W6683421858","https://openalex.org/W6712631520"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2792608345","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W4387194049","https://openalex.org/W2018332730"],"abstract_inverted_index":{"Insider":[0],"threats":[1,76,113,125,153],"that":[2,18,50,96,135,154],"occur":[3,97,155],"within":[4,45],"organizations":[5,158],"cause":[6],"more":[7],"serious":[8],"damage":[9],"than":[10],"external":[11],"threats.":[12],"However,":[13],"there":[14,61],"are":[15,19,54],"many":[16],"factors":[17],"difficult":[20],"to":[21,37,58,67,169],"determine,":[22],"such":[23],"as":[24],"the":[25,80],"definition,":[26,81],"classification,":[27,82],"and":[28,41,60,83,106,129,159,165],"severity":[29],"of":[30,86,90,151,173],"security":[31,94,177],"breaches;":[32],"hence,":[33],"it":[34],"is":[35,49,62],"necessary":[36],"analyze":[38],"system":[39,168],"logs":[40,89],"user":[42],"behavior-based":[43],"scenarios":[44],"organizations.":[46],"The":[47],"reality":[48],"qualitative":[51],"judgment":[52],"criteria":[53],"different":[55],"for":[56,111,176],"everyone":[57],"apply,":[59],"no":[63],"detailed":[64],"verification":[65],"procedure":[66],"compare":[68],"them":[69],"objectively.":[70],"In":[71,101],"this":[72],"study,":[73],"realistic":[74],"insider":[75,112,124,142,152],"were":[77,109,126],"examined":[78],"through":[79],"correlation/association":[84],"analysis":[85,138],"various":[87,116],"human\u2013machine":[88],"acts":[91],"associated":[92],"with":[93],"breaches":[95],"in":[98,156],"an":[99,162],"organization.":[100],"addition,":[102],"a":[103,122,130,166,171],"quantitative":[104],"process":[105,132,164],"decision-making":[107,131,167],"tool":[108],"developed":[110],"by":[114],"establishing":[115],"internal":[117],"information":[118,175],"leakage":[119],"scenarios.":[120,144],"As":[121],"result,":[123],"assessed":[127],"quantitatively":[128],"was":[133],"completed":[134],"enabled":[136],"case":[137],"based":[139],"on":[140],"several":[141],"threat":[143],"This":[145],"study":[146],"will":[147,160],"enable":[148],"precise":[149],"modeling":[150],"real":[157],"support":[161],"objective":[163],"establish":[170],"range":[172],"required":[174],"protection":[178],"measures.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
