Information security policies: A review of challenges and influencing factors
Organisations increasingly perceive their employees as a great asset that needs to be cared
for; however, at the same time, they view employees as one of the biggest potential threats …
for; however, at the same time, they view employees as one of the biggest potential threats …
[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …
organisational assets and the trust they enjoy. Organisations can only mitigate insider …
[HTML][HTML] Insider threat detection in cyber-physical systems: a systematic literature review
The rapid expansion of cyber-physical systems (CPSs) has introduced new security
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
challenges, leading to the emergence of various threats, attacks, and controls aimed at …
Including insider threats into risk management through Bayesian threat graph networks
Cybersecurity incidents do represent a serious danger for companies. In fact, the number of
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …
[PDF][PDF] A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
Researchers have used the lens of social sciences to examine the characteristics of insider
threats to understand motivation and subsequently develop appropriate organizational …
threats to understand motivation and subsequently develop appropriate organizational …
An agent-based approach to modeling insider threat
JA Sokolowski, CM Banks, TJ Dover - Computational and mathematical …, 2016 - Springer
This paper describes the modeling of the potential of an organization to develop an insider
threat given certain attributes of its culture. The model represents all employees of the …
threat given certain attributes of its culture. The model represents all employees of the …
An analysis of motive and observable behavioral indicators associated with insider cyber-sabotage and other attacks
M Maasberg, X Zhang, M Ko, SR Miller… - IEEE Engineering …, 2020 - ieeexplore.ieee.org
Malicious insider attacks affect all sectors, economies, and organizations of the world, with
insider cyber-sabotage causing significant damage. Key findings from previous research on …
insider cyber-sabotage causing significant damage. Key findings from previous research on …
A multidimension taxonomy of insider threats in cloud computing
Security is considered a significant deficiency in cloud computing, and insider threats
problem exacerbate security concerns in the cloud. In addition to that, cloud computing is …
problem exacerbate security concerns in the cloud. In addition to that, cloud computing is …
Redefining insider threats: a distinction between insider hazards and insider threats
M Reveraert, T Sauer - Security Journal, 2021 - Springer
This article suggests a new definition of insiders and insider threats. It refrains from applying
a harm-oriented perspective that concentrates on the insider's intention to cause harm …
a harm-oriented perspective that concentrates on the insider's intention to cause harm …
Influencing factors identification in smart society for insider threat in law enforcement agency using a mixed method approach
K Kisenasamy, S Perumal, V Raman… - International Journal of …, 2021 - Springer
One of the main principle goals for threat protection is to understand the behavior of the
employee. An employee who is trusted will have the potential to cause more harm to the …
employee. An employee who is trusted will have the potential to cause more harm to the …