Search For:

Displaying 1-7 out of 7 total
Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats
Found in: Hawaii International Conference on System Sciences
By Frank L. Greitzer,Lars J. Kangas,Christine F. Noonan,Angela C. Dalton,Ryan E. Hohimer
Issue Date:January 2012
pp. 2392-2401
In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize th...
   
Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Christopher R. Brown,Alison Watkins,Frank L. Greitzer
Issue Date:January 2013
pp. 1849-1858
Organizations face growing risks from malicious or careless insiders. An insider threat may take many forms, including disgruntled workers, individuals under financial stress or intentional acts of espionage. Waiting for threats to manifest may leave an or...
   
Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Frank L. Greitzer,Jeremy Strozer,Sholom Cohen,John Bergey,Jennifer Cowley,Andrew Moore,David Mundie
Issue Date:January 2014
pp. 2025-2034
Organizations often suffer harm from individuals who bear them no malice but whose actions unintentionally expose the organizations to risk in some way. This paper examines initial findings from research on such cases, referred to as unintentional insider ...
   
Combating the Insider Cyber Threat
Found in: IEEE Security and Privacy
By Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull
Issue Date:January 2008
pp. 61-64
Organizations must implement effective training to raise staff awareness about insider threats and the need for organizations to adopt a more effective approach to identifying potential risks and then taking proactive steps to mitigate them.
 
Methods and Metrics for Evaluating Analytic Insider Threat Tools
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Frank L. Greitzer,Thomas A. Ferryman
Issue Date:May 2013
pp. 90-97
The insider threat is a prime security concern for government and industry organizations. As insider threat programs come into operational practice, there is a continuing need to assess the effectiveness of tools, methods, and data sources, which enables c...
   
Realizing scientific methods for cyber security
Found in: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER '12)
By David Manz, Frank L. Greitzer, Thomas E. Carroll, Thomas Edgar
Issue Date:July 2012
pp. 19-24
There is little doubt among cyber security researchers about the lack of rigor underlying much of the scientific literature. The issues are manifold and are well documented. Much of the problem lies with insufficient scientific methods. Cyber security exis...
     
Cognitive science implications for enhancing training effectiveness in a serious gaming context
Found in: Journal on Educational Resources in Computing (JERIC)
By Frank L. Greitzer, Kristy Huston, Olga Anna Kuchar
Issue Date:November 2007
pp. 2-es
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate...
     
 1