Mapping Social Media Insider Threat Attack Vectors
Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science...
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/14264 |
| _version_ | 1848748576972210176 |
|---|---|
| author | Armstrong, Colin |
| author2 | Ralph Sprague, Jr |
| author_facet | Ralph Sprague, Jr Armstrong, Colin |
| author_sort | Armstrong, Colin |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding. |
| first_indexed | 2025-11-14T07:07:15Z |
| format | Conference Paper |
| id | curtin-20.500.11937-14264 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:07:15Z |
| publishDate | 2013 |
| publisher | IEEE Computer Society |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-142642017-09-13T14:06:28Z Mapping Social Media Insider Threat Attack Vectors Armstrong, Colin Ralph Sprague, Jr Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding. 2013 Conference Paper http://hdl.handle.net/20.500.11937/14264 10.1109/HICSS.2013.392 IEEE Computer Society restricted |
| spellingShingle | Armstrong, Colin Mapping Social Media Insider Threat Attack Vectors |
| title | Mapping Social Media Insider Threat Attack Vectors |
| title_full | Mapping Social Media Insider Threat Attack Vectors |
| title_fullStr | Mapping Social Media Insider Threat Attack Vectors |
| title_full_unstemmed | Mapping Social Media Insider Threat Attack Vectors |
| title_short | Mapping Social Media Insider Threat Attack Vectors |
| title_sort | mapping social media insider threat attack vectors |
| url | http://hdl.handle.net/20.500.11937/14264 |