{"id":"https://openalex.org/W2190692258","doi":"https://doi.org/10.5220/0005480407090720","title":"Using Internet Activity Profiling for Insider-threat Detection","display_name":"Using Internet Activity Profiling for Insider-threat Detection","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2190692258","doi":"https://doi.org/10.5220/0005480407090720","mag":"2190692258"},"language":"en","primary_location":{"id":"doi:10.5220/0005480407090720","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005480407090720","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005480407090720","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060392072","display_name":"Bushra Alahmadi","orcid":"https://orcid.org/0000-0003-1917-4871"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Bushra A. Alahmadi","raw_affiliation_strings":["University of Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053235466","display_name":"Phil Legg","orcid":"https://orcid.org/0000-0003-3460-5609"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Philip A. Legg","raw_affiliation_strings":["University of the West of England, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of the West of England, United Kingdom","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075453550","display_name":"Jason R. C. Nurse","orcid":"https://orcid.org/0000-0003-4118-1680"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jason R. C. Nurse","raw_affiliation_strings":["University of Oxford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Oxford, United Kingdom","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060392072"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":2.3838,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.91207957,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"709","last_page":"720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8098348379135132},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.8025846481323242},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5583420395851135},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5565873980522156},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.548369288444519},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5270811915397644},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5032989382743835},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17420551180839539},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08339512348175049},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.04992246627807617}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8098348379135132},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.8025846481323242},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5583420395851135},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5565873980522156},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.548369288444519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5270811915397644},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5032989382743835},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17420551180839539},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08339512348175049},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.04992246627807617},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0005480407090720","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005480407090720","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:67508","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005480407090720>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.5220/0005480407090720","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005480407090720","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/14","display_name":"Life below water"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W99276301","https://openalex.org/W158530383","https://openalex.org/W1492667596","https://openalex.org/W1582361950","https://openalex.org/W1654306951","https://openalex.org/W1678518841","https://openalex.org/W1964679475","https://openalex.org/W1969795119","https://openalex.org/W1973871257","https://openalex.org/W1981085689","https://openalex.org/W1982777740","https://openalex.org/W1999289652","https://openalex.org/W2002715976","https://openalex.org/W2014440441","https://openalex.org/W2022467705","https://openalex.org/W2024190895","https://openalex.org/W2027115557","https://openalex.org/W2040054521","https://openalex.org/W2047318098","https://openalex.org/W2058818389","https://openalex.org/W2064135376","https://openalex.org/W2077504940","https://openalex.org/W2096632950","https://openalex.org/W2101173463","https://openalex.org/W2112404582","https://openalex.org/W2118076585","https://openalex.org/W2119595472","https://openalex.org/W2125923491","https://openalex.org/W2148694408","https://openalex.org/W2160157564","https://openalex.org/W2255638286","https://openalex.org/W2532755691","https://openalex.org/W3120669575"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2286217954"],"abstract_inverted_index":{"The":[0,168],"insider-threat":[1],"problem":[2],"continues":[3],"to":[4,9,25,31,44,51,112,143,175,184,192],"be":[5,77,110,161,182,203],"a":[6,107,113,133,210],"major":[7],"risk":[8],"both":[10],"public":[11],"and":[12,22,61,86,104,149,212],"private":[13],"sectors,":[14],"where":[15,83],"those":[16],"people":[17],"who":[18],"have":[19],"privileged":[20],"knowledge":[21],"access":[23],"choose":[24],"abuse":[26],"this":[27,172],"in":[28,47,171,190],"some":[29,69],"way":[30,70],"cause":[32],"harm":[33],"towards":[34,71],"their":[35],"organisation.":[36],"To":[37],"combat":[38],"against":[39],"this,":[40],"organisations":[41],"are":[42],"beginning":[43],"invest":[45],"heavily":[46],"deterrence":[48],"monitoring":[49],"tools":[50,66],"observe":[52],"employees":[53],"activity,":[54],"such":[55,65],"as":[56,147],"computer":[57],"access,":[58],"Internet":[59,178],"browsing,":[60],"email":[62],"communications.":[63],"Whilst":[64],"may":[67,76],"provide":[68],"detecting":[72],"attacks":[73],"afterwards,":[74],"what":[75],"more":[78],"useful":[79],"is":[80,166,174],"preventative":[81],"monitoring,":[82],"user":[84],"characteristics":[85,189],"behaviours":[87],"inform":[88],"about":[89],"the":[90,102,127,186,206,213,221],"possibility":[91],"of":[92,106,129,223],"an":[93,130,151],"attack":[94],"before":[95,163],"it":[96],"happens.":[97],"Psychological":[98],"research":[99],"advocates":[100],"that":[101,199],"behaviour":[103,154],"preference":[105],"person":[108],"can":[109,202],"explained":[111],"great":[114],"extent":[115],"by":[116],"psychological":[117,144,188],"constructs":[118,145],"called":[119],"personality":[120,215],"traits,":[121,216],"which":[122,217],"could":[123,160,181,218],"then":[124],"possibly":[125],"indicate":[126],"likelihood":[128],"individual":[131],"being":[132],"potential":[134,158,194],"insider":[135,225],"threat.":[136],"By":[137],"considering":[138],"how":[139,150,177],"browsing":[140,153,179],"content":[141,207],"relates":[142],"(such":[146],"OCEAN),":[148],"individual\u00e2??s":[152,187],"deviates":[155],"over":[156],"time,":[157],"insider-threats":[159],"uncovered":[162],"significant":[164],"damage":[165],"caused.":[167],"main":[169],"contribution":[170],"paper":[173],"explore":[176],"activity":[180],"used":[183],"predict":[185],"order":[191],"detect":[193],"insider-threats.":[195],"Our":[196],"results":[197],"demonstrate":[198],"predictive":[200],"assessment":[201],"made":[204],"between":[205],"available":[208],"on":[209],"website,":[211],"associated":[214],"greatly":[219],"improve":[220],"prospects":[222],"preventing":[224],"attacks.":[226]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
