Entry Shabtai:2016:BSU from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Shabtai:2016:BSU,
  author =       "Asaf Shabtai and Maya Bercovitch and Lior Rokach and
                 Ya'akov (Kobi) Gal and Yuval Elovici and Erez Shmueli",
  title =        "Behavioral Study of Users When Interacting with Active
                 Honeytokens",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "3",
  pages =        "9:1--9:??",
  month =        apr,
  year =         "2016",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2854152",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 15 13:02:47 MDT 2016",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Active honeytokens are fake digital data objects
                 planted among real data objects and used in an attempt
                 to detect data misuse by insiders. In this article, we
                 are interested in understanding how users (e.g.,
                 employees) behave when interacting with honeytokens,
                 specifically addressing the following questions: Can
                 users distinguish genuine data objects from
                 honeytokens? And, how does the user's behavior and
                 tendency to misuse data change when he or she is aware
                 of the use of honeytokens? First, we present an
                 automated and generic method for generating the
                 honeytokens that are used in the subsequent behavioral
                 studies. The results of the first study indicate that
                 it is possible to automatically generate honeytokens
                 that are difficult for users to distinguish from real
                 tokens. The results of the second study unexpectedly
                 show that users did not behave differently when
                 informed in advance that honeytokens were planted in
                 the database and that these honeytokens would be
                 monitored to detect illegitimate behavior. These
                 results can inform security system designers about the
                 type of environmental variables that affect people's
                 data misuse behavior and how to generate honeytokens
                 that evade detection.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries