2016
DOI: 10.1007/s10588-016-9210-8
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to the special issue on insider threat modeling and simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Modeling and simulation approaches from the social and behavioral sciences can be used to generate synthetic data and build in control groups and/or comparison groups. 113 Additional modeling methodologies from military intelligence and counterterrorism have potential application to insider threat as well. 114,115 Both of these approaches may contribute to the development of a scientific discipline of insider threat to rigorously test hypotheses, confirm or refute existing theory, or lead to the development of new theory.…”
Section: Discussionmentioning
confidence: 99%
“…Modeling and simulation approaches from the social and behavioral sciences can be used to generate synthetic data and build in control groups and/or comparison groups. 113 Additional modeling methodologies from military intelligence and counterterrorism have potential application to insider threat as well. 114,115 Both of these approaches may contribute to the development of a scientific discipline of insider threat to rigorously test hypotheses, confirm or refute existing theory, or lead to the development of new theory.…”
Section: Discussionmentioning
confidence: 99%
“…With the increased risk of insider threats, organisations should set up certain controls to protect their data from being stolen. However, there are some findings in the literature, such as Moore et al (2016), which indicate that many organisations do not have any existing program or plan to control insider threats, and the programs that do exist have serious insufficiencies. Indeed, it is very risky to ignore the importance of data protection, and in doing so an organisation might end up embroiled in fraud, bankruptcy or reputational damages.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, according to the findings in the literature, many organisations have no insider threat program in place, and most programs that do exist have serious deficiencies (Moore et al , 2016). Moreover, the results of industry surveys indicate that some organisations certainly would not pay attention to increasing the security education of their employees, contractors, and business partners (Farahmand and Spafford, 2013; Nurse et al , 2014).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Insider threat is defined as any activity by military, government, or private company employees whose actions or inactions, by intent or negligence, result (or could result) in the loss of critical information or valued assets [2]. Two types of insider threats are distinguished: malicious insider threats and unintentional insider threats [3].…”
Section: Introductionmentioning
confidence: 99%