Controlling access to a secure resource. Data relating to social media history information, demographic information, and psychometric information regarding a user having access to a secure resource is mined by a computer system. Mined data that indicates a potential security risk that meets a predefined security criteria with respect to the secure resource is identified by the computer system. A security risk level based on the identified data is determined. A level of access to the secure resource by the user computing device is set, based on one or more predetermined threshold values that are met, in response to a determination regarding such. Access is granted to the secure resource in accordance with the set level of access, in response to receiving a request to access the secure resource by the computer system.
展开▼