Insider threat response and recovery strategies in financial services firms
暂无分享,去创建一个
Jason R. C. Nurse | Ioannis Agrafiotis | Ioannis Agrafiotis | Jacqueline Eggenschwiler | Jacqueline Eggenschwiler
[1] Hung Q. Ngo,et al. Insider Threat Analysis Using Information-Centric Modeling , 2007, IFIP Int. Conf. Digital Forensics.
[2] Dennis Kundisch,et al. New Strategies for Financial Services Firms: The Life-Cycle-Solution Approach , 2003 .
[3] Ram Dantu,et al. Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals , 2016, J. Internet Serv. Inf. Secur..
[4] Sadie Creese,et al. Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[5] N. Denzin,et al. The SAGE handbook of qualitative research , 2005 .
[7] Dawn M. Cappelli,et al. Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .
[8] John Sullivant. Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency , 2016 .
[9] Stephen H. Conrad,et al. A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.
[10] Martin C. Libicki,et al. A Framework for Programming and Budgeting for Cybersecurity , 2016 .
[11] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[12] Sadie Creese,et al. A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches , 2014, HCI.
[13] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[14] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .
[15] Parmvir Singh. The role of Banking and Financial Services industry in economic recovery , 2015 .
[16] Gabriel Ong,et al. Combating Violent Extremism and Radicalization in the Digital Era , 2016 .
[17] Robin M. Ruefle,et al. Components and Considerations in Building an Insider Threat Program , 2013 .
[18] David S. Wall,et al. White Paper : Data Loss Prevention Organizational Security and the Insider Threat : Malicious , Negligent and Well-Meaning Insiders , 2022 .
[19] Chris Wargo,et al. An Introduction to Insider Threat Management , 2007, Inf. Secur. J. A Glob. Perspect..