Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
暂无分享,去创建一个
James F. Burke | Ignacio J. Martinez-Moyano | Bahadir K. Akcam | Michael E. Samsa | I. Martinez-Moyano | M. Samsa | J. Burke
[1] George P. Richardson,et al. Introduction to System Dynamics Modeling with DYNAMO , 1981 .
[2] D. Kolb. Experiential Learning: Experience as the Source of Learning and Development , 1983 .
[3] Joshua Klayman,et al. Learning from feedback in probabilistic environments , 1984 .
[4] J. Klayman. Chapter 4 On the How and Why (not) of Learning from Outcomes , 1988 .
[5] J. Klayman. Cue discovery in probabilistic environments: Uncertainty and experimentation. , 1988 .
[6] Gustavo Stubrich. The Fifth Discipline: The Art and Practice of the Learning Organization , 1993 .
[7] Daniel Gopher,et al. Toward a generalization of signal detection theory to N -person games: the example of two-person safety problem , 1995 .
[8] J. Forrester. Industrial Dynamics , 1997 .
[9] I. Erev,et al. Signal detection by human observers: a cutoff reinforcement learning model of categorization decisions under uncertainty. , 1998, Psychological review.
[10] K. R. Hammond. Judgments Under Stress , 1999 .
[11] Colin Camerer,et al. Experience‐weighted Attraction Learning in Normal Form Games , 1999 .
[12] John D. Sterman,et al. System Dynamics: Systems Thinking and Modeling for a Complex World , 2002 .
[13] Eugene Schultz,et al. Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .
[14] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[15] Gurpreet Dhillon,et al. Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .
[16] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[17] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[18] J Swanson,et al. Business Dynamics—Systems Thinking and Modeling for a Complex World , 2002, J. Oper. Res. Soc..
[19] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[20] David L. Cooke,et al. A system dynamics analysis of the Westray mine disaster , 2003 .
[21] Jose J. Gonzalez,et al. A system dynamics model of an insider attack on an information system , 2003 .
[22] Jose J. Gonzalez,et al. The Role of Learning and Risk Perception in Compliance , 2003 .
[23] Jose J. Gonzalez,et al. Modeling instrumental conditioning - the behavioral regulation approach , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[24] Steffen Bayer,et al. Business dynamics: Systems thinking and modeling for a complex world , 2004 .
[25] D. Davis,et al. Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .
[26] David F. Andersen,et al. Preliminary System Dynamics Maps of the Insider Cyber-threat Problem , 2004 .
[27] Eliot H. Rich,et al. Simulating Insider Cyber-Threat Risks : A Model-Based Case and a Case-Based Model , 2005 .
[28] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector , 2005 .
[29] Sensitivity Analysis of an Infectious Disease Model , 2005 .
[30] Stephen H. Conrad,et al. Modeling the Emergence of Insider Threat Vulnerabilities , 2006, Proceedings of the 2006 Winter Simulation Conference.
[31] Eliot H. Rich,et al. Integrating Judgment and Outcome Decomposition : Exploring Outcome-based Learning Dynamics , 2006 .
[32] Stephen H. Conrad,et al. An Outcome-Based Learning Model to Identify Emerging Threats: Experimental and Simulation Results , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[33] Stephen H. Conrad,et al. A behavioral theory of insider-threat risks: A system dynamics approach , 2008, TOMC.