Training organizational supervisors to detect and prevent cyber insider threats: two approaches
暂无分享,去创建一个
Jared Freeman | Cali M. Fidopiastis | Alan Carlin | Terence S. Andre | Dee H. Andrews | John Feeney | Patricia Fitzgerald | C. Fidopiastis | J. Freeman | Alan S. Carlin | D. Andrews | Terence S. Andre | Jean E. Feeney | Patricia Fitzgerald | John Feeney
[1] Colin Rose,et al. Accelerated Learning for the 21ST Century , 1997 .
[2] Salvatore V. Falletta. Evaluating Training Programs: The Four Levels: Donald L. Kirkpatrick, Berrett-Koehler Publishers, San Francisco, CA, 1996, 229 pp. , 1998 .
[3] Paul E. Spector,et al. The Stressor-Emotion Model of Counterproductive Work Behavior. , 2005 .
[4] Dawn M. Cappelli,et al. Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis , 2006 .
[5] Deborah A. Frincke,et al. Social/Ethical Issues in Predictive Insider Threat Monitoring , 2011 .
[6] E. J. Sondik,et al. The Optimal Control of Partially Observable Markov Decision Processes. , 1971 .
[7] Deborah A. Frincke,et al. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation , 2010, Insider Threats in Cyber Security.
[8] Rebecca J. Bennett,et al. Counterproductive Work Behavior: Investigations of Actors and Targets , 2004 .
[9] Randall F. Trzeciak,et al. Common Sense Guide to Prevention and Detection of Insider Threats , 2006 .
[10] Pierre A. Balthazard,et al. Neuroscience of Leadership , 2015 .
[11] J P Fisher,et al. The brain at work , 2011, The Journal of physiology.
[12] W. Bennis,et al. The Social Psychology of Organizations , 1966 .
[13] Robert J. Crutcher,et al. The role of deliberate practice in the acquisition of expert performance. , 1993 .
[14] Bryan P. Bergeron,et al. Developing serious games , 2006 .
[15] Richard C. Atkinson,et al. Ingredients for a theory of instruction. , 1972 .
[16] Kay U. Herr,et al. Suggestology and Outlines of Suggestopedy@@@Psychic Studies , 1978 .
[17] Michael Lawlor,et al. The Creative Trainer: Holistic Facilitation Skills for Accelerated Learning , 1997 .
[18] Frank L. Greitzer,et al. Identifying at-risk employees: A behavioral model for predicting potential insider threats , 2010 .