{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:37:21Z","timestamp":1761489441547,"version":"3.40.4"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_11","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"119-131","source":"Crossref","is-referenced-by-count":10,"title":["Business Process Modeling for Insider Threat Monitoring and Handling"],"prefix":"10.1007","author":[{"given":"Vasilis","family":"Stavrou","sequence":"first","affiliation":[]},{"given":"Miltiadis","family":"Kandias","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Karoulas","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Hammer, M., Champy, J.: Reengineering the corporation: A manifesto for business revolution. Harper Collins (2009)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Weske, M.: Business process management: concepts, languages, architectures. Springer (2012)","DOI":"10.1007\/978-3-642-28616-2"},{"key":"11_CR3","series-title":"LNBIP","first-page":"1","volume-title":"Information Systems: Methods, Models, and Applications","author":"D. Karagiannis","year":"2013","unstructured":"Karagiannis, D.: Business process management: A holistic management approach. In: Mayr, H.C., Kop, C., Liddle, S., Ginige, A. (eds.) UNISON 2012. LNBIP, vol.\u00a0137, pp. 1\u201312. Springer, Heidelberg (2013)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Gritzalis, D., Stavrou, V., Kandias, M., Stergiopoulos, G.: Insider Threat: Enhancing BPM through Social Media. In: 6th IFIP International Conference on New Technologies, Mobility and Security. IEEE (2014)","DOI":"10.1109\/NTMS.2014.6814027"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"6","key":"11_CR6","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","volume":"24","author":"M. Theoharidou","year":"2005","unstructured":"Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to information systems and the effectiveness of ISO17799. Computers & Security\u00a024(6), 472\u2013484 (2005)","journal-title":"Computers & Security"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, N., Reiher, P., Kuenning, G.H.: Detecting insider threats by monitoring system call activity. In: IEEE Systems, Man and Cybernetics Society, pp. 45\u201352. IEEE (2003)","DOI":"10.1109\/SMCSIA.2003.1232400"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Brown, C., Watkins, A., Greitzer, F.: Predicting insider threat risks through linguistic analysis of electronic communication. In: 46th Hawaii International Conference on System Sciences, pp. 1849\u20131858. IEEE (2013)","DOI":"10.1109\/HICSS.2013.453"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.compind.2003.10.007","volume":"53","author":"D. Grigori","year":"2004","unstructured":"Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., Shan, M.: Business process intelligence. Computers in Industry\u00a053(3), 321\u2013343 (2004)","journal-title":"Computers in Industry"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-38631-2_17","volume-title":"Network and System Security","author":"M. Kandias","year":"2013","unstructured":"Kandias, M., Galbogini, K., Mitrou, L., Gritzalis, D.: Insiders trapped in the mirror reveal themselves in social media. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol.\u00a07873, pp. 220\u2013235. Springer, Heidelberg (2013)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D.: Can we trust this user? Predicting insider\u2019s attitude via YouTube usage profiling. In: 10th International Conference on Autonomic and Trusted Computing, pp. 347\u2013354. IEEE (2013)","DOI":"10.1109\/UIC-ATC.2013.12"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Amichai-Hamburger, Y., Vinitzky, G.: Social network use and personality. In: Computers in Human Behavior, vol.\u00a026, pp. 1289\u20131295 (2010)","DOI":"10.1016\/j.chb.2010.03.018"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44895-0_12","volume-title":"Business Process Management","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Security in business process engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol.\u00a02678, pp. 168\u2013183. Springer, Heidelberg (2003)"},{"key":"11_CR14","unstructured":"J\u00fcrjens, J.: Secure systems development with UML. Springer (2005)"},{"key":"11_CR15","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-29231-6_5","volume-title":"Workshops on Business Informatics Research","author":"K. Gaaloul","year":"2012","unstructured":"Gaaloul, K., Proper, E., Charoy, F.: An Extended RBAC Model for Task Delegation in Workflow Systems. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol.\u00a0106, pp. 51\u201363. Springer, Heidelberg (2012)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Brucker, A., Hang, I., L\u00fcckemeyer, G., Ruparel, R.: SecureBPMN: Modeling and enforcing access control requirements in business processes. In: 17th ACM Symposium on Access Control Models and Technologies, pp. 123\u2013126. ACM (2012)","DOI":"10.1145\/2295136.2295160"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Ciancia, V., Martinelli, F., Matteuci, I., Petrocchi, M., Martin, J., Pimentel, E.: Automated synthesis and ranking of secure BPMN orchestrators. In: International Conference on Availability, Reliability and Security (2013)","DOI":"10.1109\/ARES.2013.60"},{"key":"11_CR18","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-29231-6_7","volume-title":"Workshops on Business Informatics Research","author":"E. Paja","year":"2012","unstructured":"Paja, E., Giorgini, P., Paul, S., Meland, P.H.: Security requirements engineering for secure business processes. In: Niedrite, L., Strazdina, R., Wangler, B. (eds.) BIR Workshops 2011. LNBIP, vol.\u00a0106, pp. 77\u201389. Springer, Heidelberg (2012)"},{"issue":"8","key":"11_CR19","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1002\/int.20432","volume":"25","author":"H. Mouratidis","year":"2010","unstructured":"Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. International Journal of Intelligent Systems\u00a025(8), 813\u2013840 (2010)","journal-title":"International Journal of Intelligent Systems"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-19125-1_3","volume-title":"Engineering Secure Software and Systems","author":"W. Arsac","year":"2011","unstructured":"Arsac, W., Compagna, L., Pellegrino, G., Ponta, S.E.: Security validation of business processes via model-checking. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol.\u00a06542, pp. 29\u201342. Springer, Heidelberg (2011)"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-15152-1_3","volume-title":"Trust, Privacy and Security in Digital Business","author":"M. Kandias","year":"2010","unstructured":"Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An insider threat prediction model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol.\u00a06264, pp. 26\u201337. Springer, Heidelberg (2010)"},{"issue":"98","key":"11_CR22","first-page":"1","volume":"2","author":"E. Shaw","year":"1998","unstructured":"Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin\u00a02(98), 1\u201310 (1998)","journal-title":"Security Awareness Bulletin"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.4018\/jdcf.2011070103","volume":"3","author":"G. Magklaras","year":"2011","unstructured":"Magklaras, G., Furnell, S., Papadaki, M.: LUARM: An audit engine for insider misuse detection. International Journal of Digital Crime and Forensics (IJDCF)\u00a03(3), 37\u201349 (2011)","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Mulle, J., Stackelberg, S., Bohm, K.: Modelling and transforming security constraints in privacy-aware business processes. In: IEEE International Conference on Service-Oriented Computing and Applications, pp. 1\u20134. IEEE (2011)","DOI":"10.1109\/SOCA.2011.6166257"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-41476-3_8","volume-title":"Critical Information Infrastructure Security","author":"M. Kandias","year":"2013","unstructured":"Kandias, M., Virvilis, N., Gritzalis, D.: The insider threat in Cloud computing. In: Bologna, S., H\u00e4mmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol.\u00a06983, pp. 93\u2013103. Springer, Heidelberg (2013)"},{"issue":"4","key":"11_CR26","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Transactions on Information & Systems\u00a090(4), 745\u2013752 (2007)","journal-title":"IEICE Transactions on Information & Systems"},{"key":"11_CR27","unstructured":"Altuhhova, O., Matulevi\u010dius, R., Ahmed, N.: An extension of business process model and notation for security risk management"},{"key":"11_CR28","unstructured":"Mundie, D., Moore, A., McIntire, D.: Building a multidimensional pattern language for insider threats. In: 19th Pattern Languages of Programs Conference, vol.\u00a012 (2012)"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Kandias, M., Stavrou, V., Bosovic, N., Gritzalis, D.: Proactive insider threat detection through social media: The YouTube case. In: 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 261\u2013266. ACM (2013)","DOI":"10.1145\/2517840.2517865"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? A new Panopticon vs. Privacy. In: 10th International Conference on Security and Cryptography, pp. 98\u2013110 (2013)","DOI":"10.5220\/0004516500980110"},{"key":"11_CR31","unstructured":"Federal Bureau of Investigation: The insider threat: An introduction to detecting and deterring an insider spy (2012), http:\/\/www.fbi.gov\/about-us\/investigate\/counterintelligence\/the-insider-threat"},{"key":"11_CR32","unstructured":"Steele, R.: Open source intelligence. In: Handbook of Intelligence Studies, p. 129 (2007)"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1111\/1468-0386.00065","volume":"5","author":"S. Simitis","year":"1999","unstructured":"Simitis, S.: Reconsidering the premises of labour law: Prolegomena to an EU regulation on the protection of employees\u2019 personal data. European Law Journal\u00a05, 45\u201362 (1999)","journal-title":"European Law Journal"},{"key":"11_CR34","volume-title":"Workplaces and Social Networking - The Implications for Employment Relations","author":"A. Broughton","year":"2009","unstructured":"Broughton, A., Higgins, T., Hicks, B., Cox, A.: Workplaces and Social Networking - The Implications for Employment Relations. Institute for Employment Studies, UK (2009)"},{"key":"11_CR35","unstructured":"Lasprogata, G., King, N., Pillay, S.: Regulation of electronic employee monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the EU, US and Canada. Stanford Technology Law Review\u00a04 (2004)"},{"key":"11_CR36","unstructured":"Fazekas, C.: 1984 is Still Fiction: Electronic Monitoring in the Workplace and US Privacy Law. Duke Law & Technology Review, 15 (2004)"},{"issue":"1-2","key":"11_CR37","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1504\/IJCIS.2013.051606","volume":"9","author":"P. Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Accessing n-order dependencies between critical infrastructures. International Journal of Critical Infrastructure Protection\u00a09(1-2), 93\u2013110 (2013)","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"6","key":"11_CR38","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.cose.2010.02.003","volume":"29","author":"M. Theoharidou","year":"2010","unstructured":"Theoharidou, M., Kotzanikolaou, P., Gritzalis, D.: A multi-layer criticality assessment methodology based on interdependencies. Computers & Security\u00a029(6), 643\u2013658 (2010)","journal-title":"Computers & Security"},{"key":"11_CR39","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-04798-5_3","volume-title":"Critical Infrastructure Protection III","author":"M. Theoharidou","year":"2009","unstructured":"Theoharidou, M., Kotzanikolaou, P., Gritzalis, D.: Risk-based criticality analysis. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol.\u00a0311, pp. 35\u201349. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:06:16Z","timestamp":1746345976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}