Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft

被引:5
|
作者
Shaikh, Asif [1 ]
机构
[1] Florida State Univ, Tallahassee, FL 32306 USA
关键词
Shadow-IT system; Information security; Sensitive information;
D O I
10.1007/978-3-319-92285-0_44
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Shadow IT is taken as a key example of unauthorized use of IT resources/tools and is defined as collaborative systems for communication and sharing content among employees of an organization. Currently, organizations are struggling to understand the threats to their sensitive information assets and the necessary means to combat them. This research study seeks to understand such specific threats posed by insiders in an organizational context that facilitate such unauthorized use of Information technology. Using a survey design, this document systematically attempts to measure the fraud risk to Personally Identifiable Information (PII) as identity (ID) theft from insiders in varying security environments. By integrating the opportunity dimension, as explained in a fraud triangle, and the organizational context of insider threat to sensitive information, this research will present a theoretical model that may help explain the relationship between the various aspects of Shadow-IT system and the potential opportunity for the fraudulent behavior from respective shadow users.
引用
收藏
页码:314 / 317
页数:4
相关论文
共 3 条
  • [1] Shadow IT system & Insider Threat: Opportunity as a Situational Perspective TREO Talk Paper
    Shaikh, Asif
    AMCIS 2018 PROCEEDINGS, 2018,
  • [2] An assessment of opportunity-reducing techniques in information security: An insider threat perspective
    Padayachee, Keshnee
    DECISION SUPPORT SYSTEMS, 2016, 92 : 47 - 56
  • [3] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512