Mapping Social Media Insider Threat Attack Vectors

Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science...

Full description

Bibliographic Details
Main Author: Armstrong, Colin
Other Authors: Ralph Sprague, Jr
Format: Conference Paper
Published: IEEE Computer Society 2013
Online Access:http://hdl.handle.net/20.500.11937/14264