Behavioral Science Guidelines for Assessing Insider Threats (original) (raw)
Related papers
Seven (Science-Based) Commandments for Understanding and Countering Insider Threats
CITRAP "Counter-Insider Threat Research And Practice", 2022
ACM Computing Surveys (CSUR), 2018
Understanding Insider Threat: A Framework for Characterising Attacks
2014 IEEE Security and Privacy Workshops, 2014
2018
Common Sense Guide to Prevention and Detection of Insider Threats
A Multi-Tiered Framework for Insider Threat Prevention
Electronics
Insider Threat Assessment: a Model-Based Methodology
ACM Computing Surveys, 2019
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications, 2013
A behavioral theory of insider-threat risks
ACM Transactions on Modeling and Computer Simulation, 2008
A Risk Management Approach to the “Insider Threat
2010
Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies
2014 47th Hawaii International Conference on System Sciences, 2014
SOFIT: Sociotechnical and Organizational Factors for Insider Threat
2018 IEEE Security and Privacy Workshops (SPW)
Identifying at-risk employees: A behavioral model for predicting potential insider threats
2010
Behavioral and policy issues in information systems security: The insider threat
European Journal of Information Systems, 2009
Organizational Vulnerability to Insider Threat
Communications in Computer and Information Science, 2016
Security Journal, 2017
Human Factor as Insider threat in Organizations
Journal of Computer Science IJCSIS
IJCSIS Vol 17 No 12 December Issue, 2019
Intelligence Analyses and the Insider Threat
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2012
Caught in the act of an insider attack: detection and assessment of insider threat
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
Insider threat: a potential challenges for the information security domain
Countermeasures of Unintentional Insider Threats: A Systematic Review
A methodology and supporting techniques for the quantitative assessment of insider threats
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing - DISCCO '13, 2013
Insider threats in corporate environments
Proceedings of the Fifth Balkan Conference in Informatics on - BCI '12, 2012