This study examines perceptions of human trustworthiness as a key component in countering insider threats. The term insider threat refers to situations where a critical member of an organization behaves against the interests of the organization, in an illegal and/or unethical manner. Identifying and detecting how an individual\u27s behavior varies over time - and how anomalous behavior can be detected - are important elements in the preventive control of insider threat behaviors. The research focuses on understanding how anomalous behavior is detected by observers. While human observations are fallible, this study adopts the concept of human-observed changes in behavior as analogous to a group of sensors on a computer network. Using onli...
Information technology advancements made during the past decade have made detecting adversaries extr...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
Over the past decade, information technology has dramatically changed the context in which economic ...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
This paper presents a socio-technical study about perceptions of human trustworthiness as a key comp...
This study examines perceptions of human trustworthiness as a key component in countering insider th...
Insider threats are both social and technological phenomena, and group dynamics can provide importan...
Virtual Team members are characterised by a lack of face to face interaction resulting from the glob...
This article reports the findings of a longitudinal study of temporary virtual teams and explores th...
This study intends to provide a theoretical ground that conceptualizes the prospect of detecting ins...
In competitive multiplayer online video games, teamwork is of utmost importance, implying high level...
To investigate group deception and demote insider threats, this study leverages network analysis to ...
Contingency in interpersonal relationships is associated with the development of secure attachment a...
Abstract—The problem of insider threat is receiving increasing attention both within the computer sc...
This proposal is intended to examine human trustworthiness as a key component for countering inside...
Information technology advancements made during the past decade have made detecting adversaries extr...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
Over the past decade, information technology has dramatically changed the context in which economic ...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
This paper presents a socio-technical study about perceptions of human trustworthiness as a key comp...
This study examines perceptions of human trustworthiness as a key component in countering insider th...
Insider threats are both social and technological phenomena, and group dynamics can provide importan...
Virtual Team members are characterised by a lack of face to face interaction resulting from the glob...
This article reports the findings of a longitudinal study of temporary virtual teams and explores th...
This study intends to provide a theoretical ground that conceptualizes the prospect of detecting ins...
In competitive multiplayer online video games, teamwork is of utmost importance, implying high level...
To investigate group deception and demote insider threats, this study leverages network analysis to ...
Contingency in interpersonal relationships is associated with the development of secure attachment a...
Abstract—The problem of insider threat is receiving increasing attention both within the computer sc...
This proposal is intended to examine human trustworthiness as a key component for countering inside...
Information technology advancements made during the past decade have made detecting adversaries extr...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
Over the past decade, information technology has dramatically changed the context in which economic ...