Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats

PD Harms, A Marbut, AC Johnston, P Lester… - Journal of Information …, 2022 - Elsevier
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

Exploring role of moral disengagement and counterproductive work behaviours in information security awareness.

L Hadlington, J Binder, N Stanulewicz - Computers in Human Behavior, 2021 - Elsevier
As security breaches in organisations are on the rise, developing an understanding of
factors enabling and preventing such breaches is crucial. Even though previous studies …

Cyber security fear appeals: Unexpectedly complicated

K Renaud, M Dupuis - Proceedings of the new security paradigms …, 2019 - dl.acm.org
Cyber security researchers are starting to experiment with fear appeals, with a wide variety
of designs and reported efficaciousness. This makes it hard to derive recommendations for …

Machine learning-based security solutions for critical cyber-physical systems

A Raza, S Memon, MA Nizamani… - 2022 10th International …, 2022 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) are complex critical infrastructure that assists society and
provides efficient services to the people and governments. CPS uses many technologies …

The spread of disinformation on the web: An examination of memes on social networking

MJ Dupuis, A Williams - … & Communications, Cloud & Big Data …, 2019 - ieeexplore.ieee.org
Social media has become a potent vector for political disinformation and propaganda, often
spread by malicious actors such as trolls or even foreign intelligence services, as famously …

Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review

A Jaiswal, P Dwivedi, RK Dewang - Multimedia Tools and Applications, 2024 - Springer
Insider threats are profoundly damaging and pose serious security challenges. These
threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as …

A primer on insider threats in cybersecurity

S Prabhu, N Thompson - Information Security Journal: A Global …, 2022 - Taylor & Francis
Though human factors are increasingly being acknowledged as a contributor to
cybersecurity incidents, this domain is not widely understood by those in technical and …

A Bayesian approach to insider threat detection

A Wall, I Agrafiotis - Journal of Wireless Mobile Networks, Ubiquitous …, 2021 - ora.ox.ac.uk
Insider attacks are an ever-increasing threat for organizations, with dire consequences.
Rogue employees who possess legitimate access to systems, and knowledge of security …

Closing the feedback loop between UX design, software development, security engineering, and operations

J Nguyen, M Dupuis - Proceedings of the 20th Annual SIG Conference …, 2019 - dl.acm.org
There have been many evolutions of the software development lifecycle (SDLC). These
differing models have moved software development groups from sequential development to …