The insider threat is potentially the most damaging and costly threat to organisations, and while there is a considerable body of literature aimed at understanding this phenomenon, we contend that the theories contained in such literature are most beneficial if they can be utilised in a way that is contextually relevant. Our research, and this paper, is specifically focussed on developing and improving this contextual validity. We find that malicious acts arising from disgruntlement are perceived as very real problems in practice. We also present a current list of non-malicious aberrant behaviours and show how they rank in relative seriousness to one another. Given that the primary motivation for conducting this study is the view tha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This research aims to develop a holistic view of insider threat behaviour and ways to manage it. Thi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
The insider threat is potentially the most damaging and costly threat to organisations, and while th...
The insider threat is potentially the most damaging and costly threat to organisations, and while th...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
In recent times there has been a spate of reporting on the counterproductive behaviour of individual...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
Abstract—The threat that insiders pose to businesses, institu-tions and governmental organisations c...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This research aims to develop a holistic view of insider threat behaviour and ways to manage it. Thi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
The insider threat is potentially the most damaging and costly threat to organisations, and while th...
The insider threat is potentially the most damaging and costly threat to organisations, and while th...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
In recent times there has been a spate of reporting on the counterproductive behaviour of individual...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
Abstract—The threat that insiders pose to businesses, institu-tions and governmental organisations c...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
This research aims to develop a holistic view of insider threat behaviour and ways to manage it. Thi...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...