Claim Missing Document
Check
Articles

Found 2 Documents
Search

Review of insider and insider threat detection in the organizations Arshiya Subhani; Iftikhar Alam Khan; Anmol Zubair
Journal of Advanced Research in Social Sciences and Humanities Vol. 6 No. 4 (2021): JARSSH
Publisher : Journal of Advanced Research in Social Sciences and Humanities

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26500/JARSSH-06-2021-0402

Abstract

Aim: The insider threat is a severe issue in cyber security. Insider threats are largely overlooked by most companies. Workers, system administrators, and outside contractors all have access to confidential company data. It is critical for the organization’s finances and reputation that such sensitive information is kept secret. If sensitive information were to escape the hands of even a tiny percentage of the authorized workforce, it could cause catastrophic financial losses. Protecting a company from the potentially disastrous actions of its own employees presents a formidable challenge, and identifying and eliminating the insider threat is a crucial part of that. This study aims to determine the types of insider threats that can exist within an organization and the best methods for countering them.Methodology: Research on the topic of insider danger is summarized in this paper. Insiders (representing types of insiders, motivation, insider access, methods used by insiders, insider profiling, and levels of insiders); Threat Detection Methods (describing methodology, techniques, datasets used to implement various insider threat detection techniques, and different analyzed user behavior); and Insider Threat Analysis (describing the various analyzed behavior of the user) are the three categories into which the research has been sorted.Findings: Within today’s increasingly digitalized businesses, dishonest employees pose a significant risk. Since the global changes in the business environment, insider threats have become a problem for most companies. There has been an increase in the insider threat since 2019, and one primary reason is the widespread adoption of cloud computing and bring-your-own-device policies for remote work.Implications/Novel Contribution: Future studies are encouraged to improve threat detection methods, evaluate the efficacy of existing methods using a real-world dataset, and adopt a hybrid approach to developing effective models for detecting insider threats.
A look into 2021 phones: A quantitative survey research study on user phone customization Kimberly Diaz; Iftikhar Alam Khan; Anmol Zubair; Zainab Aslam
Journal of Advanced Research in Social Sciences and Humanities Vol. 7 No. 2 (2022): JARSSH
Publisher : Journal of Advanced Research in Social Sciences and Humanities

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26500/JARSSH-07-2022-0201

Abstract

Aim: The research in this paper aims to identify how people modify their phones, which features are most important to them, and how phone companies can use information about their customers’ demographics to identify their products to them. The overarching goal of the research is to quantify user feedback better and to investigate new avenues for advanced phone customization.Methodology: Information about the users, including information about their devices and screenshots of their lock screens and home screens, was collected using an online survey sent out privately and publicly via direct messages.Findings: At the outset, users can alter the look of their devices by tweaking eight distinct settings: wallpaper, icons, widgets, organization, group, menu bar, launcher, and everything in between. Each user has a unique background, most of which are drawings. And then 63.75% make use of widgets, 61.25% make use of groups, and 57.50% make use other forms of organization (such as filling the screen, keeping it plain, arranging the content to see the background, using negative space, and creating patterns with the elements). Similarly, the study found that men and women use different levels of customization on their phones (men are more likely to use the basic features, while women are more likely to know the advanced ones) and that people of different ages have different levels of expertise and interest in personalizing their devices.Implications/Novel Contribution: In one of the earliest studies of its kind, the authors examine how individuals alter their mobile devices to meet their specific requirements. The collected information can help others design better-individualized services. The study provides quantitative data on how users are customizing their phones, then examines potential gaps, and finally recommends a set of features that will hopefully give phone companies new and user-tailored ideas. The user’s needs must be considered from the beginning of a product’s setup to deliver effective results.