Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural …
This article uses behavioral theories to develop an ethical decision-making model that describes how psychological factors affect the development of unethical intentions to commit …
WR Flores, E Antonsen, M Ekstedt - Computers & security, 2014 - Elsevier
This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in …
Cyber security is vital to the success of today's digital economy. The major security threats are coming from within, as opposed to outside forces. Insider threat detection and prediction …
The problem of insider threat is receiving increasing attention both within the computer science community as well as government and industry. This paper starts by presenting a …
G Gavai, K Sricharan, D Gunning, R Rolleston… - Proceedings of the 7th …, 2015 - dl.acm.org
Insider threat is a significant security risk for organizations. In this paper, we attempt to discover insider threat by identifying abnormal behavior in enterprise social and online …
M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic and versatile provision of computational resources and services. Even though the …
J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of unauthorised users of a network or system. They observe the actions of the system and its …
A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …