A method for evaluating marketer re-identification risk
Proceedings of the 2010 EDBT/ICDT Workshops
Mitigation of malicious modifications by insiders in databases
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Security Management for Mobile Ad Hoc Network of Networks MANoN
International Journal of Mobile Computing and Multimedia Communications
Guest editorial: A brief overview of data leakage and insider threats
Information Systems Frontiers
Hi-index | 0.00 |
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.