CS Store Search
Displaying 1-7 out of 7 total
Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats
Hawaii International Conference on System Sciences
By Frank L. Greitzer,Lars J. Kangas,Christine F. Noonan,Angela C. Dalton,Ryan E. Hohimer
Issue Date:January 2012
In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize th...
Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication
2013 46th Hawaii International Conference on System Sciences (HICSS)
By Christopher R. Brown,Alison Watkins,Frank L. Greitzer
Issue Date:January 2013
Organizations face growing risks from malicious or careless insiders. An insider threat may take many forms, including disgruntled workers, individuals under financial stress or intentional acts of espionage. Waiting for threats to manifest may leave an or...
Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies
2014 47th Hawaii International Conference on System Sciences (HICSS)
By Frank L. Greitzer,Jeremy Strozer,Sholom Cohen,John Bergey,Jennifer Cowley,Andrew Moore,David Mundie
Issue Date:January 2014
Organizations often suffer harm from individuals who bear them no malice but whose actions unintentionally expose the organizations to risk in some way. This paper examines initial findings from research on such cases, referred to as unintentional insider ...
Combating the Insider Cyber Threat
IEEE Security and Privacy
By Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull
Issue Date:January 2008
Organizations must implement effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them.
Methods and Metrics for Evaluating Analytic Insider Threat Tools
2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Frank L. Greitzer,Thomas A. Ferryman
Issue Date:May 2013
The insider threat is a prime security concern for government and industry organizations. As insider threat programs come into operational practice, there is a continuing need to assess the effectiveness of tools, methods, and data sources, which enables c...
Realizing scientific methods for cyber security
Found in: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER '12)
By David Manz, Frank L. Greitzer, Thomas E. Carroll, Thomas Edgar
Issue Date:July 2012
There is little doubt among cyber security researchers about the lack of rigor underlying much of the scientific literature. The issues are manifold and are well documented. Much of the problem lies with insufficient scientific methods. Cyber security exis...
Cognitive science implications for enhancing training effectiveness in a serious gaming context
Found in: Journal on Educational Resources in Computing (JERIC)
By Frank L. Greitzer, Kristy Huston, Olga Anna Kuchar
Issue Date:November 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.