VISTA: An Inclusive Insider Threat Taxonomy, with Mitigation Strategies
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
VISTA: An Inclusive Insider Threat Taxonomy, with Mitigation Strategies
Authors
Keywords
-
Journal
INFORMATION & MANAGEMENT
Volume -, Issue -, Pages 103877
Publisher
Elsevier BV
Online
2023-10-21
DOI
10.1016/j.im.2023.103877
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The effects of knowledge mechanisms on employees' information security threat construal
- (2023) Ashraf Mady et al. INFORMATION SYSTEMS JOURNAL
- Techniques and countermeasures for preventing insider threats
- (2022) Rakan A. Alsowail et al. PeerJ Computer Science
- Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse
- (2022) A. J. Burns et al. INFORMATION SYSTEMS RESEARCH
- The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19
- (2022) Ali F. Al‐Qahtani et al. IET Information Security
- The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
- (2022) Lai-Wan Wong et al. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
- Use of behavioural change taxonomies in systematic reviews and meta‐analyses regarding obesity management
- (2022) Ochije Okonya et al. Clinical Obesity
- A Multi-Tiered Framework for Insider Threat Prevention
- (2021) Rakan A. Alsowail et al. Electronics
- Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance
- (2021) Charlette Donalds et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Towards protecting organisations’ data by preventing data theft by malicious insiders
- (2021) Abir Al-Harrasi et al. International Journal of Organizational Analysis
- Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures
- (2021) Aristotle Onumo et al. ACM Transactions on Management Information Systems
- Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks
- (2021) Neeshe Khan et al. Cognition Technology & Work
- Preventing insider threats to enhance organizational security: The role of opportunity-reducing techniques
- (2021) Myeongki Jeong et al. TELEMATICS AND INFORMATICS
- Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework
- (2021) Salifu Yusif et al. Journal of Applied Security Research
- Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
- (2020) Neetesh Saxena et al. Electronics
- The dark triad and insider threats in cyber security
- (2020) Michele Maasberg et al. COMMUNICATIONS OF THE ACM
- Insight Into Insiders and IT
- (2019) Ivan Homoliak et al. ACM COMPUTING SURVEYS
- Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset
- (2019) Verena Zimmermann et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Human factors in information leakage: mitigation strategies for information sharing integrity
- (2019) Wai Peng Wong et al. INDUSTRIAL MANAGEMENT & DATA SYSTEMS
- Detecting and Preventing Cyber Insider Threats: A Survey
- (2018) Liu Liu et al. IEEE Communications Surveys and Tutorials
- Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
- (2018) Won Park et al. Security and Communication Networks
- Do I really belong?: Impact of employment status on information security policy compliance
- (2018) Shwadhin Sharma et al. COMPUTERS & SECURITY
- Guarding Against the Insider Threat
- (2018) Edmund G. Archuleta et al. JOURNAL AMERICAN WATER WORKS ASSOCIATION
- The Insider Threat: Behavioral indicators and factors influencing likelihood of intervention
- (2018) Alison J C Bell et al. International Journal of Critical Infrastructure Protection
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- A Multidimension Taxonomy of Insider Threats in Cloud Computing
- (2016) Mohannad J. Alhanahnah et al. COMPUTER JOURNAL
- An assessment of opportunity-reducing techniques in information security: An insider threat perspective
- (2016) Keshnee Padayachee DECISION SUPPORT SYSTEMS
- Fraud detection system: A survey
- (2016) Aisha Abdallah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
- (2014) John D'Arcy et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- A method for taxonomy development and its application in information systems
- (2012) Robert C Nickerson et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Detecting Anomalous Insiders in Collaborative Information Systems
- (2012) You Chen et al. IEEE Transactions on Dependable and Secure Computing
- The future of technologies for personalised medicine
- (2012) Alison Harvey et al. New Biotechnology
- Working to rule or working safely? Part 2: The management of safety rules and procedures
- (2012) Andrew Hale et al. SAFETY SCIENCE
- The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
- (2011) Merrill Warkentin et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Behavioral and policy issues in information systems security: the insider threat
- (2009) Merrill Warkentin et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
- (2009) Scott R Boss et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- A taxonomy of behavior change techniques used in interventions.
- (2008) Charles Abraham et al. HEALTH PSYCHOLOGY
- Insiders Behaving Badly
- (2008) Joel Predd et al. IEEE SECURITY & PRIVACY
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now