Mapping Social Media Insider Threat Attack Vectors
Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science...
| Main Author: | Armstrong, Colin |
|---|---|
| Other Authors: | Ralph Sprague, Jr |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/14264 |
Similar Items
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012)
by: Munshi, A., et al.
Published: (2012)
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013)
by: Munshi, Asmaa Mahdi
Published: (2013)
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020)
by: Prabhu, sunitha, et al.
Published: (2020)
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015)
by: Saat, Rozaidah
Published: (2015)
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010)
by: Munshi, Asmaa
Published: (2010)
Parental awareness on cyber threats using social media
by: Nazilah Ahmad@Ahmad Arifin,, et al.
Published: (2019)
by: Nazilah Ahmad@Ahmad Arifin,, et al.
Published: (2019)
Benefits and threats to using social media for presenting and implementing evidence
by: Cook, C., et al.
Published: (2018)
by: Cook, C., et al.
Published: (2018)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
UKIP: inside the campaign to redraw the map of British politics
by: Goodwin, Matthew, et al.
Published: (2015)
by: Goodwin, Matthew, et al.
Published: (2015)
Mass media: potential threat to young minds
by: Wahab, Zanirah, et al.
Published: (2017)
by: Wahab, Zanirah, et al.
Published: (2017)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Ultrasound mediation of bioluminescence generated inside optically scattering media
by: Ahmad, Junaid
Published: (2019)
by: Ahmad, Junaid
Published: (2019)
“Happy to provide the knives”: Governmentality and threats of violence via social media in the case of Roosh V and Return of Kings
by: Bender, Stuart
Published: (2017)
by: Bender, Stuart
Published: (2017)
The changes of media landscape in Malaysia: how citizen journalism poses threats to traditional media
by: Malia Taibi,, et al.
Published: (2020)
by: Malia Taibi,, et al.
Published: (2020)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Perspectives on social sustainability and interior architecture: Life from the inside
by: Smith, Dianne, et al.
Published: (2014)
by: Smith, Dianne, et al.
Published: (2014)
Inside the Dance
by: Bender, Stuart
Published: (2012)
by: Bender, Stuart
Published: (2012)
Identifying DOS attacks using data pattern analysis
by: Salem, Mohammed, et al.
Published: (2008)
by: Salem, Mohammed, et al.
Published: (2008)
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021)
by: Ooi, Hui Ni, et al.
Published: (2021)
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
by: Ooi, Hui Ni, et al.
Published: (2021)
by: Ooi, Hui Ni, et al.
Published: (2021)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Privacy threat analysis of mobile social network data publishing
by: Abawajy, Jemal H., et al.
Published: (2018)
by: Abawajy, Jemal H., et al.
Published: (2018)
Social media influencer marketing: Science mapping of the present and future trends
by: Muhammad Ashraf, Fauzi, et al.
Published: (2024)
by: Muhammad Ashraf, Fauzi, et al.
Published: (2024)
Mapping the impact of social media for innovation: the role of social media in explaining innovation performance in the PDMA Comparative Performance Assessment Study
by: Roberts, Deborah L., et al.
Published: (2016)
by: Roberts, Deborah L., et al.
Published: (2016)
Brand Preferences, Social Influences and the Stated Needs of the Adolescent Shopper: An Insider's Perspective
by: Koukidis, Nikolaos
Published: (2007)
by: Koukidis, Nikolaos
Published: (2007)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
A preliminary propagation tool in social engineering attacks
by: Hoong, Peggy
Published: (2021)
by: Hoong, Peggy
Published: (2021)
Mixed vector equilibrium problem involving multi-valued mapping
by: Rahaman, Mijanur, et al.
Published: (2016)
by: Rahaman, Mijanur, et al.
Published: (2016)
Social motives in intergroup conflict: group identity and perceived target of threat
by: Weisel, Ori, et al.
Published: (2016)
by: Weisel, Ori, et al.
Published: (2016)
Online social networking: a source of intelligence for advanced persistent threats
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2012)
Childhood bullying, paranoid thinking, and the misappraisal of social threat: trouble at school
by: Jack, Alexander H., et al.
Published: (2017)
by: Jack, Alexander H., et al.
Published: (2017)
Insider trading and financing constraints
by: Ataullah, Ali, et al.
Published: (2014)
by: Ataullah, Ali, et al.
Published: (2014)
Looking Inside the Unemployment Spell
by: Dockery, Alfred Michael
Published: (2004)
by: Dockery, Alfred Michael
Published: (2004)
Globe Ball and Inside Out
by: Castleden, Susanna
Published: (2014)
by: Castleden, Susanna
Published: (2014)
Little man inside us
by: Cheah, Pike See, et al.
Published: (2016)
by: Cheah, Pike See, et al.
Published: (2016)
Beautiful from the inside out
by: Len, Evelyn
Published: (2014)
by: Len, Evelyn
Published: (2014)
Existence results for strong mixed vector equilibrium problem for multivalued mappings
by: Kilicman, Adem, et al.
Published: (2014)
by: Kilicman, Adem, et al.
Published: (2014)
Threats to Freedom of Speech
by: Zimmermann, A., et al.
Published: (2013)
by: Zimmermann, A., et al.
Published: (2013)
Similar Items
-
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012) -
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013) -
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012) -
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020) -
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015)