2021
DOI: 10.1108/ijoa-01-2021-2598
|View full text |Cite
|
Sign up to set email alerts
|

Towards protecting organisations’ data by preventing data theft by malicious insiders

Abstract: Purpose One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 34 publications
0
3
0
2
Order By: Relevance
“…They may also have a thorough grasp of the system's security rules and methods, allowing them to circumvent its security features quickly. Many non-blockchain-based studies [36][37][38][39][40][41][42][43][44][45][46][47][48][49][50] for detecting insider threat have been conducted. However, our focus in this survey is on blockchain-based data breach detection studies.…”
Section: Comprehensive Reviewmentioning
confidence: 99%
“…They may also have a thorough grasp of the system's security rules and methods, allowing them to circumvent its security features quickly. Many non-blockchain-based studies [36][37][38][39][40][41][42][43][44][45][46][47][48][49][50] for detecting insider threat have been conducted. However, our focus in this survey is on blockchain-based data breach detection studies.…”
Section: Comprehensive Reviewmentioning
confidence: 99%
“…Ensuring compliance involves understanding and adhering to the principles of data minimization, purpose limitation, and transparency. Cross-border data governance is particularly challenging, requiring strategies for managing data sovereignty issues and addressing the varying legal frameworks across jurisdictions [192]- [199]. Implementing robust data governance policies, encryption protocols, and secure data transfer mechanisms are essential to meet regulatory requirements and build trust among users and stakeholders, thereby fostering responsible and lawful big data analytics practices on a global scale.…”
Section: Regulatory Compliance and Cross-border Data Governancementioning
confidence: 99%
“…Masalah utama yang dihadapi fintech adalah cybercrime yang selalu muncul modus baru seiring dengan perkembangan teknologi informasi dan komunikasi (Al-Harrasi et al, 2021;Vedral, 2021). Masalah cybercrime menyebabkan berbagai kendala meliputi regulasi penanggulangan cybercrime pada fintech masih belum kuat, hilang, berubah atau bocornya data dan informasi, serta pencurian kekayaan intelektual (Faya & Ogbuefi, 2019) yang menyebabkan merosotnya kepercayaan publik (Adeyoju, 2019;Boitan & Marchewka-Bartkowiak, 2021;Corbet & Gurdgiev, 2017;Cyriac & Sadath, 2019;Faya & Ogbuefi, 2019;Huang & Madnick, 2020;G.…”
Section: Masalah Cybercrime Pada Fintechunclassified
“…Berkembangnya teknologi inovatif maka muncul peningkatan pencurian hak kekayaan intelektual berupa pencurian hak paten, hak cipta dan rahasia dagang yang diawali dengan serangan cybercrime pada fintech yang menjadi korban (Al-Harrasi et al, 2021).…”
Section: Pencurian Kekayaan Intelektualunclassified