The enemy within? The connection between insider threat and terrorism

D BaMaung, D McIlhatton, M MacDonald… - Studies in Conflict & …, 2018 - Taylor & Francis
While the threat from terrorism has gained widespread acknowledgment over the last
decade, the infiltration of organizations by “terrorist” insiders has not, and the potential …

FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage

S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of
business or consumer data, which is often triggered by multi-stage attacks and advanced …

[图书][B] Emerging internet-based technologies

MNO Sadiku - 2019 - taylorfrancis.com
The author of this book has identified the seven key emerging Internet-related technologies:
Internet of things, smart everything, big data, cloud computing, cybersecurity, software …

Cyber-security policy decisions in small businesses

J Patterson - 2017 - search.proquest.com
Cyber-attacks against small businesses are on the rise yet small business owners often lack
effective strategies to avoid these attacks. The purpose of this qualitative multiple case study …

What's in your policy? An analysis of the current state of information security policies in academic institutions

J Weidman, J Grossklags - 2018 - aisel.aisnet.org
Colleges and universities across the United States have seen data breaches and intellectual
property theft rise at a heightened rate over the past several years, partly driven by the …

Assessing the current state of information security policies in academic organizations

J Weidman, J Grossklags - Information & Computer Security, 2020 - emerald.com
Purpose Colleges and universities across the USA have seen data breaches and
intellectual property theft rise at a heightened rate over the past several years. An integral …

Learning from" shadow security": understanding non-compliant behaviours to improve information security management

I Kirlappos - 2016 - discovery.ucl.ac.uk
This thesis examines employee interaction with information security in large organisations. It
starts by revisiting past research in user-centred security and security management …

Security onboarding: an interview study on security training for temporary employees

A Hudock, J Weidman, J Grossklags - Proceedings of Mensch und …, 2020 - dl.acm.org
After being placed into a position, it is common for new employees to be acclimated to an
organization's culture, rules, and procedures via a process called onboarding. These …

Exploring information security awareness training to reduce unauthorized disclosure of information in public schools

A Fleming - 2017 - search.proquest.com
Advances in technological uses within public schools provide increased methods to collect
and store non-public personal information (NPI) or personally identifiable information (PII) …

Corporate cyberespionage: identification and prevention part 1

B Mitchell - Edpacs, 2020 - Taylor & Francis
The purpose of this paper is to present an argument for a methodology to detect and prevent
cyber-based corporate espionage. The focus of this paper will be on the human domain and …