How to balance insider threats and employee privacy

被引:0
|
作者
机构
[1] Kohen, Isaac
来源
Kohen, Isaac | 1600年 / Information Systems Audit and Control Association (ISACA)卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Positioning Your Organization to Respond to Insider Threats
    Greitzer F.L.
    Purl J.
    Leong Y.M.
    Sticha P.J.
    IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83
  • [42] Rising to the Challenge of Insider Threats for Middle Powers
    Modini, Jessemyn
    Van Zomeren, Mark
    Fowler, Stuart
    Joiner, Keith
    Lynar, Tim
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 521 - 529
  • [43] Towards Formal Analysis of Insider Threats for Auctions
    Kammuller, Florian
    Kerber, Manfred
    Probst, Christian W.
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
  • [44] Predict insider threats using human behaviors
    Mills J.U.
    Stuban S.M.F.
    Dever J.
    IEEE Engineering Management Review, 2017, 45 (01): : 39 - 48
  • [45] Understanding and countering insider threats in software development
    Franz, Michael
    2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90
  • [46] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
  • [47] Mining for Insider Threats in Business Transactions and Processes
    Eberle, William
    Holder, Lawrence
    2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, 2009, : 163 - 170
  • [48] Access control requirements for preventing insider threats
    Park, Joon S.
    Giordano, Joseph
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534
  • [49] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [50] A Multidimension Taxonomy of Insider Threats in Cloud Computing
    Alhanahnah, Mohannad J.
    Jhumka, Arshad
    Alouneh, Sahel
    COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622