The insider threat to information systems and the effectiveness of ISO17799

@article{Theoharidou2005TheIT,
  title={The insider threat to information systems and the effectiveness of ISO17799},
  author={Marianthi Theoharidou and Spyros Kokolakis and Maria Karyda and Evangelos A. Kiountouzis},
  journal={Computers & Security},
  year={2005},
  volume={24},
  pages={472-484}
}
Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate the approach followed by ISO17799, the dominant standard in IS security management, in addressing this type of threat. We unfold the criminology theory that has designated the measures against insider misuse suggested by the standard, i.e. the General Deterrence Theory, and explore the possible enhancements to the standard that could result from the study of more recent… CONTINUE READING
BETA

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 74 CITATIONS, ESTIMATED 37% COVERAGE

200 Citations

02040'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 200 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
SHOWING 1-10 OF 32 REFERENCES

A framework for understanding and predicting insider attacks

  • E. E. Schultz
  • Computers and Security, 21(6): 526-531.
  • 2002
Highly Influential
5 Excerpts

Understanding attitudes and predicting social behaviour

  • I. Ajzen, M. Fishbein
  • Motivational Process. Journal of Research in…
  • 1980
Highly Influential
6 Excerpts

Understanding and Addressing Criminal Opportunity: The Application of Situational Crime Prevention to IS Security

  • R. Willison
  • Working Paper Series 100, Department of…
  • 2001
Highly Influential
4 Excerpts

A preliminary structural approach to insider computer misuse incidents

  • T. Tuglular
  • proceedings of EICAR International Conference…
  • 2000
Highly Influential
8 Excerpts

An insider threat model for adversary simulation

  • B. J. Wood
  • Anderson, R., Bozek, T, Longstaff, T., Meitzler…
  • 2000
Highly Influential
5 Excerpts

Similar Papers

Loading similar papers…