2018
DOI: 10.1002/9781119419785
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…For authors such as Arduin (2018), insider threats may be categorized in two dimensions: (a) whether the character of the threat is intentional, and (b) whether its character is malicious. From the point of view of the employee, who may be the entry point into the system, an insider threat can be 1.…”
Section: Background Theory and Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…For authors such as Arduin (2018), insider threats may be categorized in two dimensions: (a) whether the character of the threat is intentional, and (b) whether its character is malicious. From the point of view of the employee, who may be the entry point into the system, an insider threat can be 1.…”
Section: Background Theory and Assumptionsmentioning
confidence: 99%
“…For authors such as Arduin (2018), insider threats may be categorized in two dimensions: (a) whether the character of the threat is intentional, and (b) whether its character is malicious. From the point of view of the employee, who may be the entry point into the system, an insider threat can be 1. unintentional: wrong actions taken by an inexperienced, negligent, or influenced employee, for example, an overhasty click, input error, accidental deletion of sensitive data, etc.…”
Section: Unintentional Insider Threats: When Countermeasures Show a L...mentioning
confidence: 99%
See 1 more Smart Citation
“…Authors such as [66] represent a part of the literature on information systems security that tends to pay attention to insider threats, more particularly those whose perpetrators are humans with the intention to cause harm (upper right branch in Figure 2). For authors such as [5], insider threats may be categorized along two dimensions: (1) whether the character of the threat is intentional or not, and (2) whether its character is malicious or not. From the point of view of the employee, who may constitute the entry point into the system, an insider threat can be: The study presented in this article focuses on the manipulation and social engineering techniques that exploit unintentional insider threats (category 1 above).…”
Section: On Insider Threatsmentioning
confidence: 99%
“…Nevertheless, the academic literature as well as industrial professionals consider that a predominant threat is neither technical nor external, but human and inside the organization [54,29,64,66]. Such an insider threat may be intentional or non intentional, malicious or non malicious [35,65,5].…”
Section: Introductionmentioning
confidence: 99%