{"title":"基于欺诈钻石组件的隐私保护上下文感知内部威胁预测与预防模型","authors":"Solomon Mekonnen, Keshnee Padayachee, M. Meshesha","doi":"10.1109/GOCICT.2015.20","DOIUrl":null,"url":null,"abstract":"This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond\",\"authors\":\"Solomon Mekonnen, Keshnee Padayachee, M. Meshesha\",\"doi\":\"10.1109/GOCICT.2015.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.\",\"PeriodicalId\":221523,\"journal\":{\"name\":\"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GOCICT.2015.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GOCICT.2015.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond
This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.