Mapping Social Media Insider Threat Attack Vectors

Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science...

Full description

Bibliographic Details
Main Author: Armstrong, Colin
Other Authors: Ralph Sprague, Jr
Format: Conference Paper
Published: IEEE Computer Society 2013
Online Access:http://hdl.handle.net/20.500.11937/14264
_version_ 1848748576972210176
author Armstrong, Colin
author2 Ralph Sprague, Jr
author_facet Ralph Sprague, Jr
Armstrong, Colin
author_sort Armstrong, Colin
building Curtin Institutional Repository
collection Online Access
description Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding.
first_indexed 2025-11-14T07:07:15Z
format Conference Paper
id curtin-20.500.11937-14264
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T07:07:15Z
publishDate 2013
publisher IEEE Computer Society
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-142642017-09-13T14:06:28Z Mapping Social Media Insider Threat Attack Vectors Armstrong, Colin Ralph Sprague, Jr Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding. 2013 Conference Paper http://hdl.handle.net/20.500.11937/14264 10.1109/HICSS.2013.392 IEEE Computer Society restricted
spellingShingle Armstrong, Colin
Mapping Social Media Insider Threat Attack Vectors
title Mapping Social Media Insider Threat Attack Vectors
title_full Mapping Social Media Insider Threat Attack Vectors
title_fullStr Mapping Social Media Insider Threat Attack Vectors
title_full_unstemmed Mapping Social Media Insider Threat Attack Vectors
title_short Mapping Social Media Insider Threat Attack Vectors
title_sort mapping social media insider threat attack vectors
url http://hdl.handle.net/20.500.11937/14264