References
- Simmon ED, NIST. Evaluation of cloud computing services based on NIST SP 800-145. NIST special pub. Gaithersburg (MD): U.S. Department of Commerce, National Institute of Standards and Technology; 2018. doi:10.6028/NIST.SP.500-322.
- Kajiyama T, Jennex M, Addo T. To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions. Inf Comput Secur. 2017;25(5):634–59. doi:10.1108/ICS-07-2016-0051.
- Kumar PR, Raj PH, Jelciana P. Exploring data security issues and solutions in cloud computing. Procedia Comput Sci. 2018;125(2009):691–97. doi:10.1016/j.procs.2017.12.089.
- Elifoglu IH, Abel I, Taşseven Ö. Minimizing insider threat risk with behavioral monitoring. Rev Bus. 2018; 38(2): 61–73. https://search.proquest.com/docview/2085003999?accountid=164702.
- Cole E, Ring S. Insider threat - protecting the enterprise from sabotage, spying, and theft. Byrne G, Melani M. editors. Rockland (MA): Syngress Publishing,Inc.; 2005.
- Liang N, Biros DP, Luse A. An empirical validation of malicious insider characteristics. J Manage Inf Sys. 2016;33(2):361–92. doi:10.1080/07421222.2016.1205925.
- Mahajan A, Sharma S. The malicious insiders threat in the cloud. Int J Eng Res Gener Sci. 2015; 3(2): 246–56. www.ijergs.org
- Alexander M. Protect, detect and correct methodology to mitigate incidents: insider threats. ISACA J. 2018;3. https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/protect-detect-and-correct-methodology-to-mitigate-incidents-insider-threats.
- Chou T-S. Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol. 2013;5(3):79–88. doi:10.5121/ijcsit.2013.5306.
- Verizon. Protected health information data breach report; 2018. https://enterprise.verizon.com/resources/reports/2018/protected_health_information_data_breach_report.pdf.
- Theis M, Trzeciak R, Costa D, Moore A, Miller S, Cassidy T, Claycomb W. Common sense guide to mitigating insider threats. 6th ed. Pittsburgh (PA): Software Engineering Institute; 2019. https://resources.sei.cmu.edu/asset_files/TechnicalReport/2019_005_001_540647.pdf.
- Khan AY, Latif R, Latif S, Tahir S, Batool G, Saba T. Malicious insider attack detection in IoTs using data analytics. IEEE Access. 2020;8:11743–53. doi:10.1109/ACCESS.2019.2959047.
- Williams ML, Levi M, Burnap P, Gundur RV. Under the corporate radar: examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behav. 2018;40(9):1119–31. doi:10.1080/01639625.2018.1461786.
- Gray DE. Doing research in the real world. 3rd ed. Seaman J editor. London (UK): SAGE Publications Ltd; 2014.
- Saunders MNK, Lewis P, Thornhill A. Research methods for business students. 8th ed. Harlow (UK): Pearson Edcucation; 2019. https://public.ebookcentral.proquest.com/choice/FullRecord.aspx?p=5774744.
- Cybersecurity Insiders. Insider threat report – 2019; 2019. https://www.cybersecurity-insiders.com/portfolio/insider-threat-report/.
- Cybersecurity Insiders, Crowd Research Partners. Insider threat - 2018 report; 2018. https://crowdresearchpartners.com/wp-content/uploads/2017/07/Insider-Threat-Report-2018.pdf.
- Cyberhaven. Insider threat report – 2020; 2020. https://www.cyberhaven.com/cyberhaven-2020-insider-threat-report-cybersecurity-insiders.
- Rocha F, Gross T, van Moorsel A. Defense-in-depth against malicious insiders in the cloud. 2013 IEEE International Conference on Cloud Engineering (IC2E), Cloud Engineering (IC2E), 2013 IEEE International Conference on, ic2e; 2013. pp. 88–97. https://ezproxy.aut.ac.nz/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=edseee&AN=edseee.6529272&site=eds-live. doi:10.1109/IC2E.2013.20.
- Barona R, Anita EAM. A survey on data breach challenges in cloud computing security: issues and threats. Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017; 2017. doi:10.1109/ICCPCT.2017.8074287.
- Ryan MD. Cloud computing security: the scientific challenge, and a survey of solutions. J Syst Software. 2013;86(9):2263–68. doi:10.1016/j.jss.2012.12.025.
- Parsons K, McCormac A, Butavicius M, Pattinson M, Jerram C. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput Secur. 2014:42. doi:10.1016/j.cose.2013.12.003.
- Gökçe KG, Dogerlioglu O. “Bring your own device” policies: perspectives of both employees and organizations. Knowledge Manage E-Learning. 2019; 11(2): 233–46. https://search.proquest.com/scholarly-journals/bring-your-own-device-policies-perspectives-both/docview/2287036606/se-2?accountid=164702.
- Liu S, Kuhn R. Data loss prevention. IT Prof Mag. 2010;12(2):10–13. https://search.proquest.com/scholarly-journals/data-loss-prevention/docview/206362177/se-2?accountid=164702.
- Salitin M, Zolait A. The role of user entity behavior analytics to detect network attacks in real time; 2018. doi:10.1109/3ICT.2018.8855782.
- Nida P, Harsh Dhiman SH. A survey on identity and access management in cloud computing. Int J Eng Res Technol. 2014;3(4). [accessed 2021 Jan 23]. https://www.ijert.org/a-survey-on-identity-and-access-management-in-cloud-computing.
- Ong YJ, Qiao M, Routray R, Raphael R. Context-aware data loss prevention for cloud storage services. 2017 IEEE 10th International Conference on Cloud Computing (CLOUD); 2017. pp. 399–406. doi:10.1109/CLOUD.2017.58.