[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

An empirical validation of malicious insider characteristics

N Liang, DP Biros, A Luse - Journal of Management Information …, 2016 - Taylor & Francis
Malicious insiders continue to pose a great threat to organizations. With their knowledge and
access to organizational resources, malicious insiders could launch attacks more easily that …

Information system security policy noncompliance: the role of situation-specific ethical orientation

G Bansal, S Muzatko, SI Shin - Information Technology & People, 2021 - emerald.com
Purpose This study examines how neutralization strategies affect the efficacy of information
system security policies. This paper proposes that neutralization strategies used to …

The acceptance of justifications among shadow IT users and nonusers–an empirical analysis

S Haag, A Eckhardt, A Schwarz - Information & Management, 2019 - Elsevier
Shadow information technology (IT) usage and justifications, which make shadow IT usage
socially acceptable, are major challenges for managers. This study contributes to a better …

Unethical but not illegal! A critical look at two-sided disinformation platforms: Justifications, critique, and a way forward

W Soliman, T Rinta-Kahila - Journal of Information …, 2024 - journals.sagepub.com
Crowdsourced disinformation represents a two-sided-market model wherein a platform
organizer orchestrates the interaction between disinformation requesters and crowdworkers …

Predicting insider breaches using employee reviews

R Dwivedi, S Nerur, G Mangalaraj - Journal of Computer …, 2024 - Taylor & Francis
Data breaches committed by current and former employees are of growing concern to
organizations. This paper draws on instrumental and expressive motives to predict the …

A gamified approach to explore techniques of neutralization of threat actors in cybercrime

A Rieb, T Gurschler, U Lechner - … and Policy: 5th Annual Privacy Forum …, 2017 - Springer
In the serious game “Operation Digital Chameleon” red and blue teams develop attack and
defense strategies as part of an IT security Awareness training. This paper presents the …

Cyber defensive capacity and capability:: A perspective from the financial sector of a small state

K de Nobrega - 2023 - research.tilburguniversity.edu
Tilburg University Cyber defensive capacity and capability: de Nobrega, Kristel Page 1 Tilburg
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …

Validating common characteristics of malicious insiders: Proof of concept study

N Liang, D Biros - 2016 49th Hawaii International Conference …, 2016 - ieeexplore.ieee.org
Malicious insiders pose a great threat to both government and private organizations. With
their knowledge and access to organizational resources, malicious insiders could launch …