2010
DOI: 10.1007/978-1-4419-7133-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat and Information Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…This was expanded to also include computer deviance in the workplace (Mastrangelo, Everton and Jolton, 2006;Robinson and Bennett, 1995;Weatherbee, 2010), information security (Coles- Kemp and Theoharidou, 2010;Colwill, 2010), and criminal profiling (Gudaitis, 1998;Nykodym, Taylor and Vilela, 2006). Mastrangelo, Everton and Jolton (2006) report that 5-10% of employees engage in "antagonistic forms of deviant computer use" (p. 739) -socially undesirable behaviors such as gambling at work, downloading pornography, asking coworkers for dates, and violating confidentiality-and that the most common forms of deviant computer use involved personal email and chat sessions.…”
Section: Relevant Researchmentioning
confidence: 99%
“…This was expanded to also include computer deviance in the workplace (Mastrangelo, Everton and Jolton, 2006;Robinson and Bennett, 1995;Weatherbee, 2010), information security (Coles- Kemp and Theoharidou, 2010;Colwill, 2010), and criminal profiling (Gudaitis, 1998;Nykodym, Taylor and Vilela, 2006). Mastrangelo, Everton and Jolton (2006) report that 5-10% of employees engage in "antagonistic forms of deviant computer use" (p. 739) -socially undesirable behaviors such as gambling at work, downloading pornography, asking coworkers for dates, and violating confidentiality-and that the most common forms of deviant computer use involved personal email and chat sessions.…”
Section: Relevant Researchmentioning
confidence: 99%
“…• 'Increase the effort' includes 'target hardening', 'control of access to facilities', 'screen exits', 'deflecting offenders' and 'controlling tools' • 'Increase the risks' includes 'extending guardianship', 'assisting natural surveillance', 'reducing anonymity', 'utilizing place managers' and 'strengthening formal surveillance' • 'Reduce the rewards' includes 'concealing targets', 'removing targets', 'identifying property', 'disrupting markets' and 'denying benefits' • 'Reduce provocations' includes 'reducing frustrations and stress', 'avoiding disputes', 'reducing emotional arousal', 'neutralizing peer pressure' and 'discouraging imitation' • 'Remove excuses' includes 'setting rules', 'posting instructions', 'alerting conscience', 'assisting compliance' and 'controlling drugs and alcohol' [70] These techniques were given 'digital analogies' by Beebe and Roa [71], Willison [15] and Coles-Kemp and Theoharidou [14]. We will consider only 'Remove excuses', as being the most appropriate to the study reported on.…”
Section: Situational Crime Preventionmentioning
confidence: 99%
“…In terms of 'posting instructions', e-mail disclaimers [71] are recommended as a comparable information security control, apart from the typical controls such as information security policy. Single sign-on [15] and 'a single point of reference for security' [14] have been proposed as information security controls to realize the 'assisting compliance' technique. In terms of 'alerting conscience', the information security controls that are recommended include copyright protection [14], a code of ethics [14] and 'multi-level warning banners' [71].…”
Section: Situational Crime Preventionmentioning
confidence: 99%
See 2 more Smart Citations