Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems

@article{Nicho2014MultipleCS,
  title={Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems},
  author={Mathew Nicho and F. Kamoun},
  journal={Commun. Assoc. Inf. Syst.},
  year={2014},
  volume={35},
  pages={18}
}
Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals. Researchers have extensively studied insiders’ motivation to attack from the broader perspective of the deterrence theory and have explored the rationale for employees to disregard/overlook security policies from the perspective of neutralization… Expand
5 Citations
An Empirical Validation of Malicious Insider Characteristics
  • 24
  • Highly Influenced
Validating Common Characteristics of Malicious Insiders: Proof of Concept Study
  • N. Liang, D. Biros
  • Computer Science
  • 2016 49th Hawaii International Conference on System Sciences (HICSS)
  • 2016
  • 4
  • Highly Influenced
  • PDF
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane
  • Mathew Nicho, Shafaq Naheed Khan
  • Computer Science
  • 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
  • 2018
  • 3

References

SHOWING 1-10 OF 98 REFERENCES
System Dynamics Based Insider Threats Modeling
  • 9
  • PDF
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
  • Jeffrey Hunker, C. Probst
  • Computer Science, Sociology
  • J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
  • 2011
  • 153
  • PDF
Reflections on the Insider Threat
  • C. Pfleeger
  • Business, Computer Science
  • Insider Attack and Cyber Security
  • 2008
  • 34
  • PDF
Human factors in information security: The insider threat - Who can you trust these days?
  • C. Colwill
  • Computer Science
  • Inf. Secur. Tech. Rep.
  • 2009
  • 266
  • PDF
A framework for understanding and predicting insider attacks
  • 313
  • PDF
Insider Attack and Cyber Security - Beyond the Hacker
  • 90
  • PDF
Combating the Insider Cyber Threat
  • 82
...
1
2
3
4
5
...