External Insider Threat: A Real Security Challenge in Enterprise Value Webs

  title={External Insider Threat: A Real Security Challenge in Enterprise Value Webs},
  author={Virginia N. L. Franqueira and Andr{\'e} van Cleeff and Pascal van Eck and Roel Wieringa},
  journal={2010 International Conference on Availability, Reliability and Security},
Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As the Jericho Forum (an industry consortium of the Open Group) observed, in all these forms of collaboration, the boundaries between organizations become permeable and, as a consequence, insiders and outsiders can no longer be neatly separated using the notion of a perimeter. Such organizational arrangements have security… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 13 extracted citations

An Enhanced Threat Identification Approach for Collusion Threats

2011 Third International Workshop on Security Measurements and Metrics • 2011
View 6 Excerpts
Highly Influenced

A Framework for Data-Driven Physical Security and Insider Threat Detection

2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) • 2018
View 1 Excerpt

Data Leakage/Loss Prevention Systems (DLP)

2014 World Congress on Computer Applications and Information Systems (WCCAIS) • 2014
View 1 Excerpt

Insider Threat Detection Using Virtual Machine Introspection

2013 46th Hawaii International Conference on System Sciences • 2013


Publications referenced by this paper.
Showing 1-10 of 34 references

SAS No. 70, Service Organizations

http://www.aicpa.org/download/members/div/auditstd/AU-00324.PDF, 2000. • 2000
View 3 Excerpts
Highly Influenced

Security Metrics: Replacing Fear, Uncertainty, and Doubt

A. Jaquith
Addison-Wesley Professional, • 2007
View 3 Excerpts
Highly Influenced

Common Sense Guide to Prevention and Detection of Insider Threats

D. Cappelli, A. Moore, R. Trzeciak, T. J. Shimeall
CERT, http:// www.cert.org, January 2009, 3rd Edition - Version 3.1. • 2009

Data loss risks during downsizing

L. Ponemon
Study sponsored by Symantec Corporation, and conducted by Ponemon Institute LLC, February 2009, http://scm.symantec.com/DLP/en/resources.php, Visited on Sep 2009. • 2009
View 1 Excerpt

Design Requirements Engineering: A Ten-Year Perspective, ser. Lecture Notes in Business Information Processing

V. Kartseva, J. Gordijn, Y.-H. Tan
ch. Designing Value- Based Inter-organizational Controls Using Patterns, • 2009
View 1 Excerpt

2008 CSI Computer Cime and Security Survey

R. Richardson
2008, http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf. Visited on Sep 2009. • 2008
View 1 Excerpt

Similar Papers

Loading similar papers…