Considering the Problem of Insider IT Misuse

  • Furnell S
  • Phyo A
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

In recent years the Internet connection has become a frequent point of attack for most organisations. However, the loss due to insider misuse is far greater than the loss due to external abuse. This paper focuses on the problem of insider misuse, the scale of it, and how it has effected the organisations. The paper also discusses why access controls alone cannot be used to address the problem, and proceeds to consider how techniques currently associated with Intrusion Detection Systems can potentially be applied for insider misuse detection. General guidelines for countermeasures against insider misuse are also provided to protect data and systems.

Cite

CITATION STYLE

APA

Furnell, S., & Phyo, A. H. (2003). Considering the Problem of Insider IT Misuse. Australasian Journal of Information Systems, 10(2). https://doi.org/10.3127/ajis.v10i2.160

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free