[HTML][HTML] The whole of cyber defense: Syncing practice and theory
KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …
predict and prevent. Although a growing body of research has examined personological …
An empirical validation of malicious insider characteristics
Malicious insiders continue to pose a great threat to organizations. With their knowledge and
access to organizational resources, malicious insiders could launch attacks more easily that …
access to organizational resources, malicious insiders could launch attacks more easily that …
Information system security policy noncompliance: the role of situation-specific ethical orientation
Purpose This study examines how neutralization strategies affect the efficacy of information
system security policies. This paper proposes that neutralization strategies used to …
system security policies. This paper proposes that neutralization strategies used to …
The acceptance of justifications among shadow IT users and nonusers–an empirical analysis
Shadow information technology (IT) usage and justifications, which make shadow IT usage
socially acceptable, are major challenges for managers. This study contributes to a better …
socially acceptable, are major challenges for managers. This study contributes to a better …
Unethical but not illegal! A critical look at two-sided disinformation platforms: Justifications, critique, and a way forward
W Soliman, T Rinta-Kahila - Journal of Information …, 2024 - journals.sagepub.com
Crowdsourced disinformation represents a two-sided-market model wherein a platform
organizer orchestrates the interaction between disinformation requesters and crowdworkers …
organizer orchestrates the interaction between disinformation requesters and crowdworkers …
Predicting insider breaches using employee reviews
Data breaches committed by current and former employees are of growing concern to
organizations. This paper draws on instrumental and expressive motives to predict the …
organizations. This paper draws on instrumental and expressive motives to predict the …
A gamified approach to explore techniques of neutralization of threat actors in cybercrime
A Rieb, T Gurschler, U Lechner - … and Policy: 5th Annual Privacy Forum …, 2017 - Springer
In the serious game “Operation Digital Chameleon” red and blue teams develop attack and
defense strategies as part of an IT security Awareness training. This paper presents the …
defense strategies as part of an IT security Awareness training. This paper presents the …
Cyber defensive capacity and capability:: A perspective from the financial sector of a small state
K de Nobrega - 2023 - research.tilburguniversity.edu
Tilburg University Cyber defensive capacity and capability: de Nobrega, Kristel Page 1 Tilburg
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …
Validating common characteristics of malicious insiders: Proof of concept study
N Liang, D Biros - 2016 49th Hawaii International Conference …, 2016 - ieeexplore.ieee.org
Malicious insiders pose a great threat to both government and private organizations. With
their knowledge and access to organizational resources, malicious insiders could launch …
their knowledge and access to organizational resources, malicious insiders could launch …