Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

[HTML][HTML] Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game

D Cohen, A Elalouf, R Zeev - International Journal of Information …, 2022 - Elsevier
Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that
organizations address and fix vulnerabilities before bad actors can find and exploit them …

The interaction of dark traits with the perceptions of apprehension

J Gaia, D Murray, G Sanders, S Sanders, S Upadhyaya… - 2022 - aisel.aisnet.org
This paper integrates dark personality traits with the economics of crime and rational choice
theories to identify the role that the Dark Triad and thrill-seeking have on the perceptions of …

Evaluating the effectiveness of ensemble machine learning approaches for detecting healthcare insider threats

LA Koory - 2023 - search.proquest.com
Insider threats are a massive threat to healthcare organizations, causing the vast majority of
data breaches and resulting in severe negative consequences for a healthcare organization …

Primary and Secondary Control as Antecedents to the Dark Traits in Predicting Attraction to Hacking Behavior

L Amo, J Gaia, D Murray, GL Sanders… - Journal of …, 2023 - articlearchives.co
The current study examines the relationship between the need for control, the Dark Triad
personality traits, and hacking intent. We surveyed 523 individuals using a scenario design …

[PDF][PDF] Estimating attackers' profiles results in more realistic vulnerability severity scores

K Kioskli, N Polemi - Hum. Fact. Cybersecur, 2022 - researchgate.net
ABSTRACT The Common Vulnerability Scoring System (CVSS) is considered a standard
measure for the severity of vulnerabilities. CVSS assumes that the potential attacker will be …

Hacking: Evolution, Conceptualization, and the Perpetrators

C Roque, M Canudo, S Moreira… - … Challenges for Cyber …, 2023 - igi-global.com
This chapter aims to present a theoretical foundation on hacking, focusing on the
perpetrator's profile, his modus operandi, and typologies. First, a conceptualization and …

ENHANCING CYBERSECURITY AWARENESS IN THE UNITED ARAB EMIRATES: AN ASSESSMENT OF CURRENT PRACTICES AND THE DEVELOPMENT OF AN …

MH Alalawi - 2024 - scholarworks.uaeu.ac.ae
In today's interconnected world, individuals, private corporations, public institutions, and
governments face increasingly sophisticated cyber threats and attacks, highlighting the …

[PDF][PDF] Diferenças individuais entre hackers e não-hackers e entre hackers black hat, white hat e grey hat

MFFC Canudo - 2024 - repositorio-aberto.up.pt
The sharp rise in technological developments has led to the creation of new criminal
behaviors, with the emergence of hacking. Hacking can be seen broadly as 'access …

Evidence Indicating the Rise in Insider Threats in Organizations and Industries: A Quantitative Descriptive Study

JB Snipes III - 2024 - search.proquest.com
The purpose of this quantitative descriptive research was to describe the perceptions of IT
cybersecurity leaders regarding reasons and motivators for insider threats and insider threat …