{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T20:07:12Z","timestamp":1762114032978,"version":"build-2065373602"},"reference-count":7,"publisher":"Breda Publishing Press","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2018,8]]},"abstract":"<jats:p> Privileged Salesforce users are necessary to every organisation. These are members of your organisation who have more advanced permission sets than the average user and can include Salesforce admins, sales reps, developers, HR staff, management and senior or executive leadership. <\/jats:p><jats:p> Privileged Salesforce users are necessary to every organisation. But they hold the keys to your kingdom, with access to a broad array of company data, security controls, workflows and resources. <\/jats:p><jats:p> These advanced users can make nearly unlimited changes to your Salesforce instance, placing your organisation at tremendous risk. And they can even cover their own tracks in the process. Privileged user abuse may be malicious or it may be unintentional. Either way, it represents a huge vulnerability to your company with the two main areas of concern being data security and compliance, explains Mike Mason of FairWarning. <\/jats:p>","DOI":"10.1016\/s1353-4858(18)30077-1","type":"journal-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T18:41:15Z","timestamp":1534790475000},"page":"6-8","source":"Crossref","is-referenced-by-count":1,"title":["Overcoming the risks of privileged user abuse in Salesforce"],"prefix":"10.70985","volume":"2018","author":[{"given":"Mike","family":"Mason","sequence":"first","affiliation":[{"name":"FairWarning"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"51855","reference":[{"key":"bib1","unstructured":"\u2018Report to the Nations: 2018 global study on occupational fraud and abuse\u2019. Association of Certified Fraud Examiners;  www.acfe.com\/report-to-the-nations\/2018\/ accessed July 2018"},{"key":"bib2","unstructured":"\u20182017 Cost of Cybercrime Study\u2019. Accenture\/Ponemon Institute;  www.accenture.com\/t20170926T072837Z__w__\/us-en\/_acnmedia\/PDF-61\/Accenture-2017-CostCyberCrimeStudy.pdf accessed July 2018"},{"key":"bib3","unstructured":"Andras Cser   \u2018Privileged Identity Management, Q3 2016\u2019; \n8 Jul 2016: \nForrester>\nwww.beyondtrust.com\/wp-content\/uploads\/forrester-wave-for-privilege-identity-management-2016.pdf?1467996373 accessed July 2018"},{"journal-title":"Wall Street Journal","year":"2015","author":"Baer Justin","key":"bib4"},{"journal-title":"Boston Globe","year":"2018","author":"Rosenblatt Joel","key":"bib5"},{"volume-title":"\u2018Privileged User Abuse & The Insider Threat\u2019","year":"2014","key":"bib6"},{"key":"bib7","unstructured":"\u2018Cost of a Data Breach Study\u2019. Ponemon Institute and IBM; \nwww.ibm.com\/security\/data-breach accessed July 2018"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485818300771?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485818300771?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/pdf\/10.1016\/S1353-4858%2818%2930077-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:18:31Z","timestamp":1733264311000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/10.1016\/S1353-4858%2818%2930077-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.1016\/S1353-4858(18)30077-1"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(18)30077-1","relation":{},"ISSN":["1353-4858","1872-9371"],"issn-type":[{"type":"print","value":"1353-4858"},{"type":"electronic","value":"1872-9371"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}