How to balance insider threats and employee privacy

被引:0
|
作者
机构
[1] Kohen, Isaac
来源
Kohen, Isaac | 1600年 / Information Systems Audit and Control Association (ISACA)卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats
    Hu, Teng
    Xin, Bangzhou
    Liu, Xiaolei
    Chen, Ting
    Ding, Kangyi
    Zhang, Xiaosong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [22] How Empowering Leadership Can Improve New Employee Engagement: The Mediating Role of Employee Perceptions of Insider Status
    Li, Wenxin
    Xv, Zhoutong
    Ji, Binying
    SAGE OPEN, 2024, 14 (03):
  • [23] Not Threats, but Resources: An Investigation of How Leaders React to Employee Constructive Voice
    Xu, Angela J.
    Loi, Raymond
    Cai, Zhenyao
    BRITISH JOURNAL OF MANAGEMENT, 2023, 34 (01) : 37 - 56
  • [24] Towards a New Taxonomy of Insider Threats
    Chaipa, Sarathiel
    Ketcha Ngassam, Ernest
    Shawren, Singh
    2022 IST-AFRICA CONFERENCE, 2022,
  • [25] Techniques and countermeasures for preventing insider threats
    Alsowail R.A.
    Al-Shehari T.
    PeerJ Computer Science, 2022, 8
  • [26] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [27] Insider Threats: It's the HUMAN, Stupid!
    Greitzer, Frank L.
    NCS'19: PROCEEDINGS OF THE NORTHWEST CYBERSECURITY SYMPOSIUM, 2019,
  • [28] The naked employee: How technology is compromising workplace privacy.
    Farris, D
    LIBRARY JOURNAL, 2003, 128 (07) : 100 - 101
  • [29] Semantic analysis for monitoring insider threats
    Symonenko, S
    Liddy, ED
    Yilmazel, O
    Del Zoppo, R
    Brown, E
    Downey, M
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 492 - 500
  • [30] Mitigating Inadvertent Insider Threats with Incentives
    Liu, Debin
    Wang, XiaoFeng
    Camp, L. Jean
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 1 - 16