How to balance insider threats and employee privacy

被引:0
|
作者
机构
[1] Kohen, Isaac
来源
Kohen, Isaac | 1600年 / Information Systems Audit and Control Association (ISACA)卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Techniques and countermeasures for preventing insider threats
    Alsowail, Rakan A.
    Al-Shehari, Taher
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [32] Detecting Insider Threats: Solutions and Trends
    Zeadally, Sherali
    Yu, Byunggu
    Jeong, Dong Hyun
    Liang, Lily
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192
  • [33] Federated Platooning: Insider Threats and Mitigations
    Callegati, Franco
    Gabbrielli, Maurizio
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3222 - 3231
  • [34] Introduction to the Special Issue on Insider Threats
    Claycomb, Bill
    Greitzer, Frank
    Jaros, Stephanie L.
    Gardner, Carrie
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [35] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [36] How often is Employee Anger an Insider Risk I? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications
    Shaw, Eric
    Payri, Maria
    Cohn, Michael
    Shaw, Ilene R.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (01) : 39 - 72
  • [37] Threats to privacy protection
    Barash, Carol Isaacson
    SCIENCE, 2007, 318 (5852) : 913 - 914
  • [38] Monitoring technology in the American workplace: Would adopting English privacy standards better balance employee privacy and productivity?
    Evans, Laura
    CALIFORNIA LAW REVIEW, 2007, 95 (04) : 1115 - 1149
  • [39] EMPLOYEE LEASING - BENEFITS AND THREATS
    MUNCHUS, G
    PERSONNEL, 1988, 65 (07) : 59 - 61
  • [40] Mitigating Insider Threats on the Edge: A Knowledgebase Approach
    Althebyan, Qutaibah
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 621 - 628