{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T17:17:08Z","timestamp":1777310228216,"version":"3.51.4"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335064","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["A framework of opportunity-reducing techniques to mitigate the insider threat"],"prefix":"10.1109","author":[{"given":"Keshnee","family":"Padayachee","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2012","journal-title":"Isaca COBIT five for information security USA Information Systems Audit & Control Association"},{"key":"ref38","article-title":"Cyber-crime science = crime science + information security","author":"hartel","year":"2010","journal-title":"Centre for Telematics and Information Technology University of Twente Enschede TR-CTIT-10&#x2013;34"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558670"},{"key":"ref32","author":"cappelli","year":"0","journal-title":"(2006) Crjommon Sense Guide to Prevention\/Detection of Insider Threats"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.11.002"},{"key":"ref30","first-page":"87","article-title":"Dealing with the malicious insider","author":"jones","year":"2008","journal-title":"6th Australian Information Security Management Conference Perth"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70440-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/505680.505684"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232458"},{"key":"ref34","author":"cappelli","year":"0","journal-title":"(2006) Common sense guide to prevention\/detection of insider threats"},{"key":"ref10","article-title":"Principles of Fraud Examination","author":"wells","year":"2008"},{"key":"ref40","article-title":"Roles of information security awareness and perceived fairness in information security policy compliance","author":"bulgurcu","year":"2009","journal-title":"presented at the 15th American Conference on Information Svstems(AMCIS)&#x2018;"},{"key":"ref11","article-title":"Opportunity makes the thief: Practical theory for crime prevention","author":"felson","year":"1998","journal-title":"Policing and Reducing Crime Unit Research Development and Statistics Directorate London Police Research Series Paper 98"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.08.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1562164.1562198"},{"key":"ref14","first-page":"45","article-title":"Insider threat and information security management","author":"coles-kemp","year":"2010"},{"key":"ref15","first-page":"1","article-title":"Using situational crime prevention theory to explain the effectiveness of information systems security","author":"beebe","year":"2005","journal-title":"SOFT conference"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"329","DOI":"10.17705\/1CAIS.02617","article-title":"Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process","volume":"26","author":"beebe","year":"2010","journal-title":"Communications of The Association for Information Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1086\/449106"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"ref19","first-page":"78","article-title":"Crime Pattern Theory","author":"brantingham","year":"2008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.279"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1016\/S0167-4048(02)01009-X","article-title":"A framework for understanding and predicting insider attacks","volume":"21","author":"schultz","year":"2002","journal-title":"Computers & Security"},{"key":"ref27","author":"silowash","year":"2012","journal-title":"Common sense guide to mitigating insider threats 4th Edition (CMU\/SEI-2012-TR-012) Software Engineering Institute Carnegie Mellon University"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.003"},{"key":"ref6","first-page":"69","article-title":"A survey of insider attack detection research: beyond the hacker","volume":"39","author":"salem","year":"2008"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/2.889093","article-title":"Windows of vulnerability: A case study analysis","volume":"33","author":"arbaugh","year":"2000","journal-title":"IEEE Computer"},{"key":"ref5","article-title":"Analysis and detection of malicious insiders","author":"maybury","year":"2005","journal-title":"MITRE Corp"},{"key":"ref8","first-page":"41","article-title":"Opportunities, precipitators and criminal decisions: A reply to Wortley's critique of situational crime prevention","volume":"16","author":"cornish","year":"2003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.231"},{"key":"ref2","year":"0","journal-title":"PwC CSO magazine CERT&#x00AE; Division of the Software Engineering Institute at Carnegie Mellon University and United States Secret Service (2014) US cybercrime Rising risks reduced readiness"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9265-x"},{"key":"ref1","year":"0","journal-title":"SpectorSoft (2014) SpectorSoft 2014 insider threat survey"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-25882-6_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.25"},{"key":"ref21","first-page":"61","article-title":"Policing and crime prevention","author":"smith","year":"2011","journal-title":"crime prevention"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/3-540-45067-X_22","article-title":"A taxonomy of single sign-on systems","volume":"2727","author":"pashalidis","year":"2003","journal-title":"Proceedings of the 8th Australasian Conference on Information Security and Privacy (ACISP)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8340098"},{"key":"ref41","article-title":"Why Johnny can't encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"1999","journal-title":"presented at the USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/35.623994"},{"key":"ref26","year":"0","journal-title":"ISO\/IEC 27002 2005 (2005) Information technology-security techniques-information security management systems-code of practice for information security management"},{"key":"ref43","author":"kelly","year":"0","journal-title":"(2002) Is single sign on a security risk?"},{"key":"ref25","first-page":"173","article-title":"A two-stage model of situational crime prevention","volume":"7","author":"wortley","year":"1998","journal-title":"Studies on Crime and Crime Prevention"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","location":"Johannesburg, South Africa","start":{"date-parts":[[2015,8,12]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335064.pdf?arnumber=7335064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T16:53:42Z","timestamp":1567356822000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335064","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}