{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:16:52Z","timestamp":1772641012142,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756845","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"41-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mitigating Insider Threats: Insights from Software Security Experts for Process Improvement and Risk Reduction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9047-1727","authenticated-orcid":false,"given":"Dr. Azzah","family":"Alghamdi","sequence":"first","affiliation":[{"name":"Imam Abdalrhman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7318-7644","authenticated-orcid":false,"given":"Mahmood","family":"Niazi","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6235-4272","authenticated-orcid":false,"given":"Lucas Carvalho","family":"Cordeiro","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6339-2257","authenticated-orcid":false,"given":"Mamoona","family":"Humayun","sequence":"additional","affiliation":[{"name":"University of Roehampton, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9795-4104","authenticated-orcid":false,"given":"Andrew","family":"Stewart","sequence":"additional","affiliation":[{"name":"University of Manchester, Manchester, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"issue":"5","key":"e_1_3_3_1_1_2","first-page":"39","article-title":"Securing Against Insider Attacks","volume":"15","author":"Lynch D.","year":"2006","unstructured":"Lynch, D. 2006. Securing Against Insider Attacks., Inf. Secur. J. A Glob. Perspect 15 (5). 39-47.","journal-title":"Inf. Secur. J. A Glob. Perspect"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Braun V. Clarke V. Boulton E. Davey L. and McEvoy C. 2021. The online survey as a qualitative research tool International journal of social research methodology 24 (6). 641-654.","DOI":"10.1080\/13645579.2020.1805550"},{"key":"e_1_3_3_1_3_2","unstructured":"Cappelli D. M. Moore A. P. and Trzeciak R. F. 2012. The CERT guide to insider threats: how to prevent detect and respond to information technology crimes (Theft Sabotage Fraud). Addison-Wesley."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30091-4"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2596825"},{"key":"e_1_3_3_1_6_2","volume-title":"C. S","author":"Homoliak I.","year":"2019","unstructured":"Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y. and Ochoa, M. J. A. C. S. 2019. Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures, 52 (2). 1-40."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Ames H. Glenton C. and Lewin S. 2019. Purposive sampling in a qualitative evidence synthesis: A worked example from a synthesis on parental perceptions of vaccination communication BMC medical research methodology 19 (1). 1-9.","DOI":"10.1186\/s12874-019-0665-4"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3174092"},{"issue":"5","key":"e_1_3_3_1_9_2","first-page":"39","article-title":"Securing Against Insider Attacks","volume":"15","author":"Lynch D.","year":"2006","unstructured":"Lynch, D. 2006. Securing Against Insider Attacks., Inf. Secur. J. A Glob. Perspect 15 (5). 39-47.","journal-title":"Inf. Secur. J. A Glob. Perspect"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2962613"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091460"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Terry G. Hayfield N. Clarke V. and Braun V. 2017. Thematic analysis The SAGE handbook of qualitative research in psychology 2 17-37.","DOI":"10.4135\/9781526405555.n2"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.006"},{"key":"e_1_3_3_1_14_2","volume-title":"TechTarget","author":"Alexander B.","year":"2021","unstructured":"S. G. Alexander and B. Jacqueline, \u201cDEFINITION compliance,\u201d TechTarget, 2021. [Online]. Available: https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/compliance. \u200c"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2022.3192767"},{"key":"e_1_3_3_1_16_2","first-page":"989","volume-title":"Mitigating Insider Threats: A Comprehensive Guide to Strategies, Tools, and Best Practices. Revista de Inteligencia Artificial en Medicina, 15(1)","author":"Larry G.","unstructured":"Larry, G., 2024. Mitigating Insider Threats: A Comprehensive Guide to Strategies, Tools, and Best Practices. Revista de Inteligencia Artificial en Medicina, 15(1), pp.989-999."},{"key":"e_1_3_3_1_17_2","first-page":"103068","volume-title":"Ain Shams Engineering Journal","author":"Inayat U.","unstructured":"Inayat, U., Farzan, M., Mahmood, S., Zia, M.F., Hussain, S. and Pallonetto, F., 2024. Insider threat mitigation: Systematic literature review. Ain Shams Engineering Journal, p.103068."}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE Companion '25"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:08:29Z","timestamp":1766491709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":17,"alternative-id":["10.1145\/3727967.3756845","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756845","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}