Corpus ID: 8326997

Assessment Challenges : Validating the Model

@inproceedings{Greitzer2009AssessmentC,
  title={Assessment Challenges : Validating the Model},
  author={F. Greitzer and Patrick R. Paulson and L. J. Kangas and Lyndsey R. Franklin and Thomas W. Edgar and D. Frincke},
  year={2009}
}
DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned… Expand
1 Citations

Figures from this paper

References

SHOWING 1-10 OF 14 REFERENCES
The Insider Threat to Information Systems
  • 175
  • PDF
Technology, workplace privacy and personhood
  • 42
Fighting computer crime - a new framework for protecting information
  • D. Parker
  • Political Science, Computer Science
  • 1998
  • 274
Verification and Validation of (Real Time) COTS Products using Fault Injection Techniques
  • 24
Probabilistic reasoning in intelligent systems
  • 4,352
  • PDF
The big picture.
  • 13
  • Highly Influential
...
1
2
...