[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

Techniques and countermeasures for preventing insider threats

RA Alsowail, T Al-Shehari - PeerJ Computer Science, 2022 - peerj.com
With the wide use of technologies nowadays, various security issues have emerged. Public
and private sectors are both spending a large portion of their budget to protect the …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

Unveiling Human Factors: Aligning Facets of Cybersecurity Leadership, Insider Threats, and Arsonist Attributes to Reduce Cyber Risk

LA Jones - SocioEconomic Challenges, 2024 - armgpublishing.com
This qualitative study is a systematic literature review (draws on literature primarily
published within the last five years) addresses a comprehensive approach to a crucial but …

Understanding the effects of situational crime prevention and personality factors on insider compliance

K Padayachee - Journal of Information Security and Applications, 2022 - Elsevier
This study investigated the moderating effects of situational factors and personality factors
on an insider's attitude towards insider compliance within the domain of information security …

[HTML][HTML] RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy

AZ Junejo, MA Hashmani, AA Alabdulatif… - Journal of King Saud …, 2022 - Elsevier
Preserving anonymity and confidentiality of transactions has become crucial with
widespread of the blockchain technology. Despite of the increased efforts for retaining …

Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence

A Pigola, PR da Costa - Information & Computer Security, 2025 - emerald.com
Purpose The purpose of this paper is to propose a dynamic capabilities framework in
cybersecurity (DCCI) and explore its potential to explain organizations' cybersecurity …

Research opportunity of insider threat detection based on machine learning methods

NTM Prajitno, H Hadiyanto… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Insider threats have been a known threat since a long time ago in the information technology
field and many researchers tried to create novel methods to solve this threat. The purpose of …

An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour

K Padayachee - Information & Computer Security, 2024 - emerald.com
Purpose This investigation serves a dual purpose: providing preliminary results and serving
as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study …

[PDF][PDF] Improved Test Case Selection Algorithm to Reduce Time in Regression Testing.

I Ghani, W Wan-Kadir, A Firdaus Arbain… - … , Materials & Continua, 2022 - cdn.techscience.cn
Regression testing (RT) is an essential but an expensive activity in software development.
RT confirms that new faults/errors will not have occurred in the modified program. RT …