A study of insider threat behaviour: developing a holistic insider threat model
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the q...
| Main Author: | Munshi, Asmaa Mahdi |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
Curtin University
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/1668 |
Similar Items
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010)
by: Munshi, Asmaa
Published: (2010)
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012)
by: Munshi, A., et al.
Published: (2012)
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020)
by: Prabhu, sunitha, et al.
Published: (2020)
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)
by: Armstrong, Colin
Published: (2013)
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015)
by: Saat, Rozaidah
Published: (2015)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Inside the Dance
by: Bender, Stuart
Published: (2012)
by: Bender, Stuart
Published: (2012)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
Corrosion behaviour of heat threated carbon steel
by: Mohamad Zaki, Hamsah
Published: (2012)
by: Mohamad Zaki, Hamsah
Published: (2012)
Little man inside us
by: Cheah, Pike See, et al.
Published: (2016)
by: Cheah, Pike See, et al.
Published: (2016)
Beautiful from the inside out
by: Len, Evelyn
Published: (2014)
by: Len, Evelyn
Published: (2014)
Insider trading and financing constraints
by: Ataullah, Ali, et al.
Published: (2014)
by: Ataullah, Ali, et al.
Published: (2014)
Looking Inside the Unemployment Spell
by: Dockery, Alfred Michael
Published: (2004)
by: Dockery, Alfred Michael
Published: (2004)
Globe Ball and Inside Out
by: Castleden, Susanna
Published: (2014)
by: Castleden, Susanna
Published: (2014)
Insider Trading: An Obstacle to the Development of Stock Market
by: Khan, Atiqur
Published: (2013)
by: Khan, Atiqur
Published: (2013)
Constructs Of Development From Inside
The Development Communication Syllabi
by: Labor, Jonalou S.
Published: (2017)
by: Labor, Jonalou S.
Published: (2017)
Tapir under threat
by: New Straits Times,
Published: (2013)
by: New Straits Times,
Published: (2013)
Threats to Freedom of Speech
by: Zimmermann, A., et al.
Published: (2013)
by: Zimmermann, A., et al.
Published: (2013)
Threats to auditor independence
by: Abu Bakar, Nur Barizah
Published: (2006)
by: Abu Bakar, Nur Barizah
Published: (2006)
Re-emerging threat
by: Mustapha, Kasmiah
Published: (2016)
by: Mustapha, Kasmiah
Published: (2016)
Facing threat of superbugs
by: Mansor, Rozaihan
Published: (2016)
by: Mansor, Rozaihan
Published: (2016)
Zika virus threat
by: Jennings, L., et al.
Published: (2016)
by: Jennings, L., et al.
Published: (2016)
The flow of an inhomogeneous fluid inside a sphere
by: Abenov, M.M., et al.
Published: (2022)
by: Abenov, M.M., et al.
Published: (2022)
A game theory model of regulatory response to insider trading
by: Smales, Lee, et al.
Published: (2016)
by: Smales, Lee, et al.
Published: (2016)
Indonesian maritime threats: a preliminary study
by: Buddy Suseto,
Published: (2021)
by: Buddy Suseto,
Published: (2021)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Chemical reactions inside carbon nanotubes
by: Miners, Scott A.
Published: (2016)
by: Miners, Scott A.
Published: (2016)
Inorganic synthesis inside carbon nanotubes
by: Stoppiello, Craig Thomas
Published: (2017)
by: Stoppiello, Craig Thomas
Published: (2017)
The Rohingyas : inside Myanmar’s hidden genocide
by: Aini Fatihah Roslam,, et al.
Published: (2018)
by: Aini Fatihah Roslam,, et al.
Published: (2018)
Introduction : brain science : inside out
by: Cheah, Pike See
Published: (2016)
by: Cheah, Pike See
Published: (2016)
Sometimes I shake inside 2
by: Ridgewell, Brenda
Published: (2008)
by: Ridgewell, Brenda
Published: (2008)
Sometimes I shake inside totally
by: Ridgewell, Brenda
Published: (2008)
by: Ridgewell, Brenda
Published: (2008)
Inside out house: totems for the voyeur
by: Spanbroek, Nancy
Published: (2012)
by: Spanbroek, Nancy
Published: (2012)
Baturaja inscription: a threats to Miańga
by: Andhifani, Wahyu Rizky, et al.
Published: (2024)
by: Andhifani, Wahyu Rizky, et al.
Published: (2024)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
The existence of insider trading in Malaysia: an event study approach
by: Yusof, Abdul Hafiz, et al.
Published: (2013)
by: Yusof, Abdul Hafiz, et al.
Published: (2013)
A street across time: Inside the Architecture Building
by: McGann, Sarah
Published: (2011)
by: McGann, Sarah
Published: (2011)
Countering the threat of Daesh in Malaysia
by: El-Muhammady, Ahmad
Published: (2016)
by: El-Muhammady, Ahmad
Published: (2016)
Similar Items
-
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010) -
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012) -
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012) -
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020) -
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)