A Unified Classification Model of Insider Threats to Information Security.
Prior work on insider threat classification has adopted a range of definitions, constructs, and terminology, making it challenging to compare studies. We address this issue by introducing a unified insider threat classification model built through a comprehensive and systematic review of prior wor...
| Main Authors: | Prabhu, sunitha, Thompson, Nik |
|---|---|
| Format: | Conference Paper |
| Published: |
2020
|
| Online Access: | http://hdl.handle.net/20.500.11937/81763 |
Similar Items
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013)
by: Munshi, Asmaa Mahdi
Published: (2013)
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015)
by: Saat, Rozaidah
Published: (2015)
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)
by: Armstrong, Colin
Published: (2013)
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010)
by: Munshi, Asmaa
Published: (2010)
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012)
by: Munshi, A., et al.
Published: (2012)
Towards an enhancement of organizational information security through Threat Factor Profiling (TFP) model
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
The Vietminh threat and the security of Thailand: Anglo-Thai response and attitude
by: Nik Anuar Nik Mahmud,
Published: (1988)
by: Nik Anuar Nik Mahmud,
Published: (1988)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Moth: a hybrid threat model for improving software security testing
by: Omotunde, Habeeb Oladapo
Published: (2018)
by: Omotunde, Habeeb Oladapo
Published: (2018)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
China's oil diplomacy: is it a global security threat?
by: Lai, Hongyi
Published: (2007)
by: Lai, Hongyi
Published: (2007)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Gender Differences in Information Security Perceptions and Behaviour
by: McGill, T., et al.
Published: (2018)
by: McGill, T., et al.
Published: (2018)
A unifying approach to moment-based shape orientation and symmetry classification
by: Tzimiropoulos, Georgios, et al.
Published: (2009)
by: Tzimiropoulos, Georgios, et al.
Published: (2009)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
A necessary evil: the Copenhagen School and the construction of migrants as security threats in political elite discourse: a comparative study of Malaysia and Singapore
by: Thompson, Caryl
Published: (2016)
by: Thompson, Caryl
Published: (2016)
The impact on non-traditional security threats in Sri Lanka
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
An Integrated Approach in Risk Management Process for Identifying Information Security Threats using Medical Research Design
by: Ahmad, Rabiah
Published: (2012)
by: Ahmad, Rabiah
Published: (2012)
Source of Information: between domination and threat to impoverish perspective of local public
by: Fadilah, Efi, et al.
Published: (2020)
by: Fadilah, Efi, et al.
Published: (2020)
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
by: Abdul Molok , Nurul Nuha
Published: (2013)
by: Abdul Molok , Nurul Nuha
Published: (2013)
Smuggling of Rohingyas from Myanmar to Malaysia: a threat to human security
by: Andika Ab Wahab,, et al.
Published: (2020)
by: Andika Ab Wahab,, et al.
Published: (2020)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
A unified constitutive model for solder materials
by: Koh, Yee Kan
Published: (2004)
by: Koh, Yee Kan
Published: (2004)
Understanding perceptions of security threats to Australia:
the case of refugees and asylum seekers
by: Bilombele, Asukulu P
Published: (2021)
by: Bilombele, Asukulu P
Published: (2021)
Security Threats of Computerised Banking Systems (CBS): the managers' perception in Malaysia
by: Malami, Abu Bakar, et al.
Published: (2012)
by: Malami, Abu Bakar, et al.
Published: (2012)
Security threats to privacy data of Malaysian youth’s: online transaction and communication
by: Shariffah Mamat,, et al.
Published: (2023)
by: Shariffah Mamat,, et al.
Published: (2023)
Maritime Supply Chain Security in the Indo-Pacific Region: Threats and Policy Implications for National Security and Resilience
by: Nguyen, Hong-Oanh, et al.
Published: (2022)
by: Nguyen, Hong-Oanh, et al.
Published: (2022)
Inside the Dance
by: Bender, Stuart
Published: (2012)
by: Bender, Stuart
Published: (2012)
Insider trading on the UK stock market: information contents and managerial incentives
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
A Survey on Internet Security Threat in Malaysia’s Internet Banking System and Suggestion Solutions
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
Data insertion and scrambling for unified scalable information hiding / Ong Sim Ying
by: Ong, Sim Ying
Published: (2015)
by: Ong, Sim Ying
Published: (2015)
Similar Items
-
A study of insider threat behaviour: developing a holistic insider threat model
by: Munshi, Asmaa Mahdi
Published: (2013) -
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015) -
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012) -
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017) -
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)