2016 49th Hawaii International Conference on System Sciences (HICSS) 2016
DOI: 10.1109/hicss.2016.463
|View full text |Cite
|
Sign up to set email alerts
|

Validating Common Characteristics of Malicious Insiders: Proof of Concept Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The term "named entity recognition" refers to an information extraction task for detecting named entities that are related, such as people, organizations, locations, expressions of time, and money [79,80]. "Dictionaries" are lists composed of keywords extracted from texts with descriptions of the characteristics related to a target term or word [81]. These textual data structures present the sensitivity of a text or document as defined by the experts in the field to which it is related [82].…”
Section: Text Mining Techniques and Technologies Applied In Public Se...mentioning
confidence: 99%
“…The term "named entity recognition" refers to an information extraction task for detecting named entities that are related, such as people, organizations, locations, expressions of time, and money [79,80]. "Dictionaries" are lists composed of keywords extracted from texts with descriptions of the characteristics related to a target term or word [81]. These textual data structures present the sensitivity of a text or document as defined by the experts in the field to which it is related [82].…”
Section: Text Mining Techniques and Technologies Applied In Public Se...mentioning
confidence: 99%
“…They also elucidated the efficacy of the critical pathway method and the psychological states of the abusers leading up to the events. These studies laid the groundwork for further psychosocial-behavioral modeling for ITRA [6,5,8,7].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, prior research has taken significant strides in enumerating the psychological factors of possible malicious insiders, but, given the broad definition of insider threat [3], has refrained from associating them with insider threat types. Research in this area has taken significant strides in elucidating these factors through case studies [4], expert interviews [5,6], and through comparisons between the psychological profiles of the general population with known malicious insiders [7,8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations