Abstract

Insider threats pose a serious risk to businesses yet risks posed by outsiders continue to remain in the spotlight. A study of insider threats is perhaps more difficult as researchers must address the socio-technical nature of the organization which requires a focus on interactions between individuals as well as between individuals and the organization’s information systems. For the purpose of this study the interpretive paradigm (Dhillon & Backhouse, 2001) was used to understand the organizational interactions. Business Intelligence tools were used to examine interactions between employees and the ERP system and revealed that illicit transactions can be found. Furthermore, tuning the diagnostic capabilities of the data analytics system to the unique characteristics of each employee increases the ability to find illicit transactions in real time.

Share

COinS
 

Addressing Insider Threats in modern ERP Environments: Business Intelligence in the Cloud

Insider threats pose a serious risk to businesses yet risks posed by outsiders continue to remain in the spotlight. A study of insider threats is perhaps more difficult as researchers must address the socio-technical nature of the organization which requires a focus on interactions between individuals as well as between individuals and the organization’s information systems. For the purpose of this study the interpretive paradigm (Dhillon & Backhouse, 2001) was used to understand the organizational interactions. Business Intelligence tools were used to examine interactions between employees and the ERP system and revealed that illicit transactions can be found. Furthermore, tuning the diagnostic capabilities of the data analytics system to the unique characteristics of each employee increases the ability to find illicit transactions in real time.