N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo… - Electronics, 2020 - mdpi.com
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape …
We present an overview of two major research projects on the role of monetary incentives and psychological traits in attracting individuals to hacking behavior. In the first study …
Insiders have the potential to do a great deal of damage, given their legitimate access to organisational assets and the trust they enjoy. Organisations can only mitigate insider …
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement …
Over the past decade, several studies, industry reports and surveys have revealed that insider threats constitute a significant role in information security. Following the literature, we …
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions …
Insider threats refer to actions by trusted individuals that directly or indirectly bring harm to the organization or expose the organization to external risks. Insider threat detection …
AP Moore, KA Kennedy, TJ Dover - Computational and Mathematical …, 2016 - Springer
Despite the high impact of insider attacks, findings show that many organizations have no insider threat program in place, and most programs that do exist have serious deficiencies …
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established …