-
3
-
-
84874933913
-
Research on Mitigating the Insider Threat to Information Systems-no.2
-
Anderson, R.H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M., VanWyk, K.: Research on Mitigating the Insider Threat to Information Systems-no.2, RAND Conference Proceedings (2000)
-
(2000)
RAND Conference Proceedings
-
-
Anderson, R.H.1
Bozek, T.2
Longstaff, T.3
Meitzler, W.4
Skroch, M.5
VanWyk, K.6
-
7
-
-
84882792603
-
-
0830, C.W.: Countering Insider Threats, Dagstuhl Seminar2
-
Bishop, M., Gollmann, D., Hunker, J., Probst, C.W.: Countering Insider Threats, Dagstuhl Seminar 08302 (2008)
-
(2008)
Probst
-
-
Bishop, M.1
Gollmann, D.2
Hunker, J.3
-
8
-
-
51249123658
-
-
3.1. Carnegie Mellon University
-
Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J.: Common Sense Guide to Prevention and Detection of Insider Threats, Ver. 3.1. Carnegie Mellon University (2009)
-
(2009)
Common Sense Guide to Prevention and Detection of Insider Threats, Ver
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.3
Shimeall, T.J.4
-
9
-
-
84882785907
-
-
Centre for the Protection of National Infrastructure, United Kingdom
-
Centre for the Protection of National Infrastructure: Ongoing personnel security-A good practise guide. United Kingdom (2008)
-
(2008)
Ongoing personnel security-A good practise guide
-
-
-
12
-
-
0001323143
-
Situational crime prevention: Theory and practice
-
Clarke, R.: Situational crime prevention: theory and practice. British Journal of Criminology. 20, 136-137 (1980)
-
(1980)
British Journal of Criminology
, vol.20
, pp. 136-137
-
-
Clarke, R.1
-
16
-
-
57649102137
-
Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique
-
Crinson, I.: Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. Information Security Technical Report, 13 (4), 202-206 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 202-206
-
-
Crinson, I.1
-
18
-
-
7744227587
-
Computer Crime at CEFORMA: A Case Study
-
(2004)
-
Dhillon, G., Silva, L., Backhouse, J. (2004) Computer Crime at CEFORMA: A Case Study. International Journal of Information Management, 24, 551-561 (2004)
-
(2004)
International Journal of Information Management
, vol.24
, pp. 551-561
-
-
Dhillon, G.1
Silva, L.2
Backhouse, J.3
-
19
-
-
0347384666
-
Culture Consequences in organizations
-
In.: Drenth, P.J.D., Koopman, P.L., Wilpert, B. (eds)
-
Drenth, P.: Culture Consequences in organizations. In.: Drenth, P.J.D., Koopman, P.L., Wilpert, B. (eds), Organizational Decision-Making under Different Economic and Political Conditions, 199-206 (1996)
-
(1996)
Organizational Decision-Making under Different Economic and Political Conditions
, pp. 199-206
-
-
Drenth, P.1
-
20
-
-
0003991890
-
-
Berkeley, University of California Press, CA
-
Hirschi, T.: Causes of delinquency. Berkeley, University of California Press, CA (1969)
-
(1969)
Causes of delinquency
-
-
Hirschi, T.1
-
21
-
-
57649090183
-
Information security management standards: Compliance, governance and risk management
-
Humphreys, E.:Information security management standards: Compliance, governance and risk management. Information Security Tech. Report, 13 (4), 247-255 (2008)
-
(2008)
Information Security Tech. Report
, vol.13
, Issue.4
, pp. 247-255
-
-
Humphreys, E.1
-
24
-
-
84870529816
-
Information Security Culture
-
In:, Cairo, Egypt. IFIP Conference Proceedings 214
-
Martins, A., Elof, J.: Information Security Culture. In: Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002), Cairo, Egypt. IFIP Conference Proceedings 214, 203-213 (2002)
-
(2002)
Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002)
, pp. 203-213
-
-
Martins, A.1
Elof, J.2
-
25
-
-
57649085788
-
ISMS Insider Intrusion Prevention and Detection
-
Overill, R.E.: ISMS Insider Intrusion Prevention and Detection. Information Security Technical Report, 13 (4), 216-219 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 216-219
-
-
Overill, R.E.1
-
26
-
-
78650874414
-
Information Security Culture: The Socio-Cultural Dimension in Information Security Management
-
In:, Cairo, Egypt. IFIP Conference Proceedings 214
-
Schlienger, T., Teufel, S.:Information Security Culture: The Socio-Cultural Dimension in Information Security Management. In: Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002), Cairo, Egypt. IFIP Conference Proceedings 214, pp. 191-202 (2002)
-
(2002)
Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002)
, pp. 191-202
-
-
Schlienger, T.1
Teufel, S.2
-
28
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W., Welke, R.J.: Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4) 441-465 (1998)
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-465
-
-
Straub, D.W.1
Welke, R.J.2
-
29
-
-
0003805614
-
-
J.B. Lippincott, Philadelphia
-
Sutherland, E.: Criminology. J.B. Lippincott, Philadelphia (1924)
-
(1924)
Criminology
-
-
Sutherland, E.1
-
30
-
-
24644470542
-
The insider threat to Information Systems and the effectiveness of ISO 17799
-
Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to Information Systems and the effectiveness of ISO 17799. Computers & Security, 24 (6), 472-484 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
31
-
-
84882777947
-
Situational Crime Prevention and Insider Threat: Countermeasures and Ethical Considerations
-
Tavani, In:, H. et al. (Eds.)
-
Theoharidou, M., Gritzalis, D.: Situational Crime Prevention and Insider Threat: Countermeasures and Ethical Considerations. In: Tavani, H. et al. (Eds.): Proc. of the 8th International Computer Ethics Conference (CEPE-2009), Greece (2009)
-
(2009)
Proc. of the 8th International Computer Ethics Conference (CEPE-2009), Greece
-
-
Theoharidou, M.1
Gritzalis, D.2
-
32
-
-
0033657872
-
Information Security-The Third Wave?
-
von Solms, B.: Information Security-The Third Wave? Computers & Security, 19 (7) 615-620 (2000)
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
von Solms, B.1
-
33
-
-
57649220126
-
Practical management of malicious insider threat-An enterprise CSIRT perspective
-
Walker, T.: Practical management of malicious insider threat-An enterprise CSIRT perspective. Information Security Technical Report, 13 (4), 225-234 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 225-234
-
-
Walker, T.1
-
35
-
-
12344260478
-
Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context
-
In
-
Willison, R.: Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context. In: Proc. of the 37th Hawaii International Conference on System Sciences (2004)
-
(2004)
Proc. of the 37th Hawaii International Conference on System Sciences
-
-
Willison, R.1
-
37
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organizational context
-
Willison, R.: Understanding the perpetration of employee computer crime in the organizational context. Information & Organization, 16 (4), 304-324 (2006)
-
(2006)
Information & Organization
, vol.16
, Issue.4
, pp. 304-324
-
-
Willison, R.1
|