Human factors in information security: The insider threat - Who can you trust these days?

@article{Colwill2009HumanFI,
  title={Human factors in information security: The insider threat - Who can you trust these days?},
  author={Carl Colwill},
  journal={Inf. Sec. Techn. Report},
  year={2009},
  volume={14},
  pages={186-196}
}
This paper examines some of the key issues relating to insider threats to information security and the nature of loyalty and betrayal in the context of organisational, cultural factors and changing economic and social factors. It is recognised that insiders pose security risks due to their legitimate access to facilities and information, knowledge of the organisation and the location of valuable assets. Insiders will know how to achieve the greatest impact whilst leaving little evidence… CONTINUE READING
Highly Influential
This paper has highly influenced 17 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 174 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 86 extracted citations

Information and Communications Security

Lecture Notes in Computer Science • 2015
View 10 Excerpts
Highly Influenced

Main human factors affecting information system security

Saeed Soltanmohammadi, Saman Asadi, Norafida Ithnin
2013
View 9 Excerpts
Highly Influenced

Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital

2013 IEEE 16th International Conference on Computational Science and Engineering • 2013
View 5 Excerpts
Highly Influenced

Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents

2012 45th Hawaii International Conference on System Sciences • 2012
View 3 Excerpts
Highly Influenced

174 Citations

02040'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 174 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 28 references

Department for business Enterprise and regulatory Reform (BERR) information security breaches survey

Berr
Department for business Enterprise and regulatory Reform (BERR) information security breaches survey • 2008
View 3 Excerpts
Highly Influenced

Security special report: the internal threat Computer Weekly, 25/4/06, http://www.computerweekly.com/Articles/ 2006/04/25/215621/security-special-report-the-internal-threat. htm

J Kavanagh
Security special report: the internal threat Computer Weekly, 25/4/06, http://www.computerweekly.com/Articles/ 2006/04/25/215621/security-special-report-the-internal-threat. htm • 2006
View 3 Excerpts
Highly Influenced

Balancing risk and reward in staff web usage policies, Computer Weekly

N Miller
Balancing risk and reward in staff web usage policies, Computer Weekly • 2010
View 1 Excerpt

Employees will choose their own computers in 2010Employees-will-choose-their- own-computers-in

K Flinders
Computer Weekly • 2010
View 1 Excerpt

Beware the enemy within, secure computing Magazine, 5/1/09, http://www.scmagazineuk.com/Beware-the-enemy- within/article

I Castle
Beware the enemy within, secure computing Magazine, 5/1/09, http://www.scmagazineuk.com/Beware-the-enemy- within/article • 2009
View 1 Excerpt

CPNI. Insider attacks

CPNI. Insider attacks • 2009

Economist intelligence Unit: Power to the people? Managing technology democracy in the workplace

Eiu
Economist intelligence Unit: Power to the people? Managing technology democracy in the workplace • 2009
View 1 Excerpt

Insiders cause most IT security breaches, Computer Weekly, 26/8/09, http://www.computerweekly.com/Articles/ 2009/08/26/237455/insiders-cause-most-it-security-breaches- study-reveals.htm

I Grant
Insiders cause most IT security breaches, Computer Weekly, 26/8/09, http://www.computerweekly.com/Articles/ 2009/08/26/237455/insiders-cause-most-it-security-breaches- study-reveals.htm • 2009
View 2 Excerpts

PwC auditors 'ignored' Satyam fraud for fees, The Times

R Blakey
PwC auditors 'ignored' Satyam fraud for fees, The Times • 2009
View 2 Excerpts

Royds J. Virtual battlefield. CIR Magazine

Royds J. Virtual battlefield. CIR Magazine • 2009

Similar Papers

Loading similar papers…