The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2008 vol.6)
pp: 66-70
Joel Predd , RAND
Jeffrey Hunker , Carnegie Mellon University
Carla Bulford , Jeffrey Hunker Associates
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.
insider threat, cyber security, cyber crime, secure systems
Joel Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford, "Insiders Behaving Badly", IEEE Security & Privacy, vol.6, no. 4, pp. 66-70, July/August 2008, doi:10.1109/MSP.2008.87
1. S.L. Robinson and J. Greenberg, "Employees Behaving Badly: Dimensions, Determinants, and Dilemmas in the Study of Workplace Deviance," Trends in Organizational Behavior, vol. 5, C.L. Cooper and D.M. Rousseau, eds., John Wiley and Sons, 1998, pp. 1–30.
2. D. Harper, "Spotlight Abuse, Save Profits," Industrial Distribution, vol 79, no. 10, 1990, pp. 47–51.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool