A human centric approach to unintentional insider threat: development of a sociotechnical framework
| Main Author: | Khan, Neeshe |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/73952/ |
Similar Items
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012)
by: Munshi, Asmaa, et al.
Published: (2012)
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010)
by: Munshi, Asmaa
Published: (2010)
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012)
by: Munshi, A., et al.
Published: (2012)
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015)
by: Saat, Rozaidah
Published: (2015)
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Allocating patrolling resources to effectively thwart intelligent attackers
by: Lowbridge, Thomas
Published: (2021)
by: Lowbridge, Thomas
Published: (2021)
Sex differences in discriminating between cues predicting threat and safety
by: Day, Harriet L., et al.
Published: (2016)
by: Day, Harriet L., et al.
Published: (2016)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Factors affecting movement of prices in Malaysia's stock exchange: comparison between KLCI and Hijrah Shariah Index / Muhammad Asyraf Abdul Rahman
by: Abdul Rahman, Muhammad Asyraf
Published: (2018)
by: Abdul Rahman, Muhammad Asyraf
Published: (2018)
Investigating the impact of hedge horizon upon hedging effectiveness: evidence from the national stock exchange of India / Mandeep Kaur and Kapil Gupta
by: Kaur, Mandeep, et al.
Published: (2019)
by: Kaur, Mandeep, et al.
Published: (2019)
Examining the impact of structural breaks on long memory of stock returns: evidence from Bombay stock exchange of India long memory / Anju Bala and Kapil Gupta
by: Bala, Anju, et al.
Published: (2020)
by: Bala, Anju, et al.
Published: (2020)
Effect of exchange rate toward U.S multinationals' stock return / Nur Darina Khalid
by: Khalid, Nur Darina
Published: (2008)
by: Khalid, Nur Darina
Published: (2008)
The exchange rate exposure to Malaysian nonfinancial firms / Hanisah Miskam
by: Miskam, Hanisah
Published: (2007)
by: Miskam, Hanisah
Published: (2007)
Random walk hypothesis: an application in the emerging stock markets / Nurul Izzati Abdul Hamid
by: Abdul Hamid, Nurul Izzati
Published: (2018)
by: Abdul Hamid, Nurul Izzati
Published: (2018)
The relationship between the performance of property related companies listed on Kuala Lumpur stock exchange
and relevant financial variables / Yusmawita Mohd Yusof
by: Mohd Yusof, Yusmawita
Published: (2000)
by: Mohd Yusof, Yusmawita
Published: (2000)
A vision system for mobile maritime surveillance platforms
by: Albrecht, Thomas
Published: (2012)
by: Albrecht, Thomas
Published: (2012)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
The existence of insider trading in Malaysia: an event study approach / Abdul Hafiz Yusof... [et al]
by: Yusof, Abdul Hafiz, et al.
Published: (2013)
by: Yusof, Abdul Hafiz, et al.
Published: (2013)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Effects of insider trading on market efficiency and volatility in Bursa Malaysia
by: Lye, Wing Fah
Published: (2011)
by: Lye, Wing Fah
Published: (2011)
Perceptions of stalking: a comparison of the prior-relationship misconception and perceptions of threat for transgender and cisgender perpetrators
by: Cook, Lydia Caroline
Published: (2020)
by: Cook, Lydia Caroline
Published: (2020)
Insider trading on the UK stock market: information contents and managerial incentives
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
by: Ajlouni, Moh'd Mahmoud
Published: (2004)
Factors influencing the rate of returns on initial public offerings a study on : KLSE’s second board / Rashdan Saferan Saat
by: Saat, Rashdan Saferan
Published: (1994)
by: Saat, Rashdan Saferan
Published: (1994)
Conflict and comedy. Insults, threats, and slapstick in the plays of Aristophanes
by: Donelan, J. F.
Published: (2019)
by: Donelan, J. F.
Published: (2019)
Effect of oil prices to the emerging stock market in Latin America and Caribbean (Argentina, Brazil and Jamaica) / Nur Afiqah Ali Rahman
by: Ali Rahman, Nur Afiqah
Published: (2010)
by: Ali Rahman, Nur Afiqah
Published: (2010)
Empirical discourse analysis on correlations between exchange rate and exports / Chayongkan Parnornmast, Kittisak Jermsittiparsert and Thanaporn Sriyakul
by: Parnornmast, Chayongkan, et al.
Published: (2013)
by: Parnornmast, Chayongkan, et al.
Published: (2013)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Applying the Theory of Planned Behaviour to predicting online safety behaviour
by: Burns, Sarah, et al.
Published: (2013)
by: Burns, Sarah, et al.
Published: (2013)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
Paranoid thinking, cognitive bias and dangerous neighbourhoods: implications for
perception of threat and expectation of victimisation
by: Jack, Alexander, et al.
Published: (2016)
by: Jack, Alexander, et al.
Published: (2016)
Sensitivity on stock returns and volatility: the case of Shari’ah-compliant securities in Bursa Malaysia / Roslina Mohamad Shaft
by: Shaft, Roslina Mohamad
Published: (2011)
by: Shaft, Roslina Mohamad
Published: (2011)
Event handling for distributed real-time cyber-physical systems
by: Singh, Jaipal, et al.
Published: (2012)
by: Singh, Jaipal, et al.
Published: (2012)
A perspective on the applications of energy-cyber-physical systems (e-CPSs) in ultra-low emission coal-fired power plants
by: Zhao, Haitao, et al.
Published: (2019)
by: Zhao, Haitao, et al.
Published: (2019)
Small states and the strategic utility of cyber capabilities
by: Domingo, Francis Rico
Published: (2018)
by: Domingo, Francis Rico
Published: (2018)
Confinement of nanostructured CeO2 inside carbon nanotubes
by: Agasti, Nityananda
Published: (2018)
by: Agasti, Nityananda
Published: (2018)
Performance of oil and gas service provider based on dividend policy from 2000 – 2009 (SapuraCrest Petroleum Bhd, Petra Perdana Bhd, & Eastern Pacific Industrial Corp. Bhd) / Mohd Fadhil Mistar
by: Mistar, Mohd Fadhil
Published: (2010)
by: Mistar, Mohd Fadhil
Published: (2010)
Childhood bullying, paranoid thinking, and the misappraisal of social threat: trouble at school
by: Jack, Alexander H., et al.
Published: (2017)
by: Jack, Alexander H., et al.
Published: (2017)
Macroeconomic determinants of stock market returns in Malaysia: evidence from FTSE KLCI / Nur Syuhadah Rosli
by: Rosli, Nur Syuhadah
Published: (2019)
by: Rosli, Nur Syuhadah
Published: (2019)
Similar Items
-
Insider threat: A critical review of the literature
by: Munshi, Asmaa, et al.
Published: (2012) -
A study of insider threat behaviour: developing a holistic framework
by: Munshi, Asmaa
Published: (2010) -
Insider threat behavior factors: a comparison of theory with reported incidents
by: Munshi, A., et al.
Published: (2012) -
Insider threat Prediction Model on Information Leakage in Cloud Computing Environment
by: Saat, Rozaidah
Published: (2015) -
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)