[PDF][PDF] An evaluation of the utility of expanding psychological screening to prevent insider attacks

J Baweja, S McGrath, D Burchett, S Jaros - OPA Report No. 2019-067 …, 2019 - dhra.mil
The Office of the Under Secretary of Defense for Intelligence funded the Defense Personnel
and Security Research Center to assess whether expanding psychological screening to …

Reflections on the insider threat

CP Pfleeger - Insider Attack and Cyber Security: Beyond the Hacker, 2008 - Springer
This paper reports on a workshop in June 2007 on the topic of the insider threat. Attendees
represented academia and research institutions, consulting firms, industry—especially the …

Alleviating insider threats: Mitigation strategies and detection techniques

JL Jenkins - 2013 - repository.arizona.edu
Insider threats--trusted members of an organization who compromise security--are
considered the greatest security threat to organizations. Because of ignorance, negligence …

“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats

H Holden, V Munro, L Tsakiris… - … Security Journal: A Global …, 2024 - Taylor & Francis
Though a reporting mechanism, in which employees report suspicious and/or potentially
malicious coworker behavior, is thought to be important to tackling insider risk, the literature …

A simulation-based approach to development of a new insider threat detection technique: active indicators

VA Yerdon, RW Wohleber, G Matthews… - Advances in Human …, 2019 - Springer
Current cybersecurity research on insider threats has focused on finding clues to illicit
behavior, or “passive indicators”, in existing data resources. However, a more proactive view …

Detecting Insider Threats: Who Is Winning the Game?

WR Claycomb - Proceedings of the 7th ACM CCS International …, 2015 - dl.acm.org
Preventing, detecting, and responding to malicious insider activity poses a significant
challenge to enterprise and organizational security. Studies continue to show the insider …

Social/ethical issues in predictive insider threat monitoring

FL Greitzer, D Frincke, M Zabriskie - Information assurance and …, 2011 - igi-global.com
Combining traditionally monitored cybersecurity data with other kinds of organizational data
is one option for inferring the motivations of individuals, which may in turn allow early …

[PDF][PDF] Can pre-employment tests identify white-collar criminals and reduce fraud risk in your organization

C O'Brien - Journal of Forensic and Investigative Accounting, 2017 - researchgate.net
Organizations struggle with effectively limiting the risk of white-collar crime. Personality tests
and integrity tests are often used to screen new applicants for behaviors indicative of white …

[图书][B] Assessing continuous evaluation approaches for insider threats

D Luckey, D Stebbins, R Orrie, E Rebhan, SD Bhatt… - 2019 - insiderthreatmitigation.org
This exploratory project examines various continuous evaluation (CE) approaches to
detecting insider threats that are available to the US government and assesses the …

Combating the insider cyber threat

FL Greitzer, AP Moore, DM Cappelli… - IEEE Security & …, 2008 - ieeexplore.ieee.org
The penetration of US national security by foreign agents as well as American citizens is a
historical and current reality that's a persistent and increasing phenomenon. Surveys, such …