Skip to main content

2018 | OriginalPaper | Buchkapitel

Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Shadow IT is taken as a key example of unauthorized use of IT resources/tools and is defined as collaborative systems for communication and sharing content among employees of an organization. Currently, organizations are struggling to understand the threats to their sensitive information assets and the necessary means to combat them. This research study seeks to understand such specific threats posed by insiders in an organizational context that facilitate such unauthorized use of Information technology. Using a survey design, this document systematically attempts to measure the fraud risk to Personally Identifiable Information (PII) as identity (ID) theft from insiders in varying security environments. By integrating the opportunity dimension, as explained in a fraud triangle, and the organizational context of insider threat to sensitive information, this research will present a theoretical model that may help explain the relationship between the various aspects of Shadow-IT system and the potential opportunity for the fraudulent behavior from respective shadow users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Cline, H.G.: Understanding the insider threat (Doctoral dissertation) (2016). Accessed from ProQuest (10103896) Cline, H.G.: Understanding the insider threat (Doctoral dissertation) (2016). Accessed from ProQuest (10103896)
Zurück zum Zitat Cressey, D.R.: Other People’s Money, pp. 1–300. Patterson Smith, Montclair (1953) Cressey, D.R.: Other People’s Money, pp. 1–300. Patterson Smith, Montclair (1953)
Zurück zum Zitat Dhillon, G., Backhouse, J.: Technical opinion: information system security management in the new millennium. Commun. ACM 43(7), 125–128 (2000)CrossRef Dhillon, G., Backhouse, J.: Technical opinion: information system security management in the new millennium. Commun. ACM 43(7), 125–128 (2000)CrossRef
Zurück zum Zitat Györy, A.A.B., Cleven, A., Uebernickel, F., Brenner, W.: Exploring the shadows: IT governance approaches to user-driven innovation (2012) Györy, A.A.B., Cleven, A., Uebernickel, F., Brenner, W.: Exploring the shadows: IT governance approaches to user-driven innovation (2012)
Zurück zum Zitat Haag, S., Eckhardt, A.: Normalizing the shadows–The role of symbolic models for individuals’ shadow IT usage. In: Proceedings of the International Conference on Information Systems, Frankfurt, Germany (2014). Accessed from https://semanticscholar.org Haag, S., Eckhardt, A.: Normalizing the shadows–The role of symbolic models for individuals’ shadow IT usage. In: Proceedings of the International Conference on Information Systems, Frankfurt, Germany (2014). Accessed from https://​semanticscholar.​org
Zurück zum Zitat Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., Harris, J.: Innovation through BYOD? Bus. Inf. Syst. Eng. 57(6), 363–375 (2015)CrossRef Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., Harris, J.: Innovation through BYOD? Bus. Inf. Syst. Eng. 57(6), 363–375 (2015)CrossRef
Zurück zum Zitat Oliveira, M., Mallmann, G.L., Maçada, A.C.G.: Can shadow IT facilitate knowledge sharing in organizations? An exploratory study. In: Proceedings of the European Conference on Knowledge Management, Coleraine, UK (2016). https://academic-conferences.org Oliveira, M., Mallmann, G.L., Maçada, A.C.G.: Can shadow IT facilitate knowledge sharing in organizations? An exploratory study. In: Proceedings of the European Conference on Knowledge Management, Coleraine, UK (2016). https://​academic-conferences.​org
Zurück zum Zitat Rentrop, C., Zimmermann, S.: Shadow IT man-agement and control of unofficial IT. In: Proceedings of the Sixth International Conference on Digital Society, Valencia, Spain (2012). Accessed from https://researchgate.net Rentrop, C., Zimmermann, S.: Shadow IT man-agement and control of unofficial IT. In: Proceedings of the Sixth International Conference on Digital Society, Valencia, Spain (2012). Accessed from https://​researchgate.​net
Zurück zum Zitat Silic, M., Back, A.: Shadow IT–A view from behind the curtain. Comput. Secur. 45, 274–283 (2014)CrossRef Silic, M., Back, A.: Shadow IT–A view from behind the curtain. Comput. Secur. 45, 274–283 (2014)CrossRef
Zurück zum Zitat White, G.L., Mediavilla, F.A.M., Shah, J.R.: Information privacy: implementation and perception of laws and corporate policies by CEOs and managers. Int. J. Inf. Secur. Priv. 5(1), 50 (2011)CrossRef White, G.L., Mediavilla, F.A.M., Shah, J.R.: Information privacy: implementation and perception of laws and corporate policies by CEOs and managers. Int. J. Inf. Secur. Priv. 5(1), 50 (2011)CrossRef
Zurück zum Zitat Zimmermann, S., Rentrop, C.: On the emergence of shadow IT-A transaction cost based approach. In: Proceedings of the European Conference on Information Systems 2014, Tel Aviv, Israel (2014). Accessed from https://researchgate.net Zimmermann, S., Rentrop, C.: On the emergence of shadow IT-A transaction cost based approach. In: Proceedings of the European Conference on Information Systems 2014, Tel Aviv, Israel (2014). Accessed from https://​researchgate.​net
Metadaten
Titel
Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft
verfasst von
Asif Shaikh
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92285-0_44

Neuer Inhalt