A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the ‘insider criminal’. Much of the academic and popular press focuses on external breaches but the greatest danger to an organisation lurks within. Whatever the motivation, the ‘trusted agent’ inside the organisation has the potential to do more damage than an anonymous outsider and it is by increasing our understanding of this threat that we will get greater value for our defence efforts. While acknowledging that a significant number of security incidents are attributable to employees, it is important to remember in an organisational context, that simply increasing security controls and sanctions has pre...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
The insider threat is potentially the most damaging and costly threat to organisations, and while t...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
The insider threat faced by corporations and governments today is a real and significant problem, an...
An enterprise's information security policy is an exceptionally important control as it provides the...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
The insider threat is potentially the most damaging and costly threat to organisations, and while t...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Organisations today operate in a world fraught with threats, including 'script kiddies', hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
The insider threat faced by corporations and governments today is a real and significant problem, an...
An enterprise's information security policy is an exceptionally important control as it provides the...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
The insider threat is potentially the most damaging and costly threat to organisations, and while t...