Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems
@article{Nicho2014MultipleCS, title={Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems}, author={Mathew Nicho and F. Kamoun}, journal={Commun. Assoc. Inf. Syst.}, year={2014}, volume={35}, pages={18} }
Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals. Researchers have extensively studied insiders’ motivation to attack from the broader perspective of the deterrence theory and have explored the rationale for employees to disregard/overlook security policies from the perspective of neutralization… Expand
Figures, Tables, and Topics from this paper
5 Citations
An Empirical Validation of Malicious Insider Characteristics
- Computer Science
- J. Manag. Inf. Syst.
- 2016
- 24
- Highly Influenced
Validating Common Characteristics of Malicious Insiders: Proof of Concept Study
- Computer Science
- 2016 49th Hawaii International Conference on System Sciences (HICSS)
- 2016
- 4
- Highly Influenced
- PDF
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane
- Computer Science
- 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
- 2018
- 3
A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime
- Computer Science, Political Science
- APF
- 2017
- 9
The Acceptance of Justifications among Shadow IT Users and Nonusers - An Empirical Analysis
- Psychology, Computer Science
- Inf. Manag.
- 2019
- 1
References
SHOWING 1-10 OF 98 REFERENCES
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques
- Computer Science, Sociology
- J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
- 2011
- 153
- PDF
Reflections on the Insider Threat
- Business, Computer Science
- Insider Attack and Cyber Security
- 2008
- 34
- PDF
Human factors in information security: The insider threat - Who can you trust these days?
- Computer Science
- Inf. Secur. Tech. Rep.
- 2009
- 266
- PDF
A framework for understanding and predicting insider attacks
- Computer Science
- Comput. Secur.
- 2002
- 313
- PDF
Insider Attack and Cyber Security - Beyond the Hacker
- Computer Science, Political Science
- Advances in Information Security
- 2008
- 90
- PDF