Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits

@article{Greitzer2014AnalysisOU,
  title={Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits},
  author={Frank L. Greitzer and Jeremy R. Strozer and Sholom Cohen and Andrew P. Moore and David A. Mundie and Jennifer Cowley},
  journal={2014 IEEE Security and Privacy Workshops},
  year={2014},
  pages={236-250}
}
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical patterns and to inform future research and development of UIT mitigation strategies. 
Highly Cited
This paper has 26 citations. REVIEW CITATIONS
17 Citations
36 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 36 references

Development of methodical social engineering taxonomy. Master’s Thesis, Monterey, CA: Naval Postgraduate School

  • L. Laribee
  • Amazon Digital Services,
  • 2006
Highly Influential
4 Excerpts

Cyber Kill Chain is a Great Idea.

  • L. Myers
  • Infosec Institute,
  • 2013
1 Excerpt

Who is more susceptible to phishing emails?: A Saudi Arabian study.

  • I. Alseadoon, T. Chan, E. Foo, J. G. Nieto
  • 23rd Australasian Conference on Information…
  • 2012
2 Excerpts

Why we fall for phishing.

  • J. Erkkila
  • In Proceedings of the SIGCHI conference on Human…
  • 2011
2 Excerpts

A Personality Based Model for Determining Susceptibility to Phishing Attacks

  • J. L. Parrish, J. L. Bailey, Courtney, J. F. 2009
  • Decision Sciences Institute, pp 285-296.
  • 2009
1 Excerpt

Security Intelligence: Attacking the Cyber Kill Chain.

  • M. Cloppert
  • SANS Computer Forensics, October
  • 2009
2 Excerpts

Similar Papers

Loading similar papers…