Show simple item record

dc.contributor.authorArmstrong, Colin
dc.contributor.editorRalph Sprague, Jr
dc.date.accessioned2017-01-30T11:42:37Z
dc.date.available2017-01-30T11:42:37Z
dc.date.created2014-02-18T20:00:21Z
dc.date.issued2013
dc.identifier.citationArmstrong, Colin. 2013. Mapping Social Media Insider Threat Attack Vectors, in Sprague, R. (ed), Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), Jan 7-10 2013, pp. 1840-1848. Hawaii, USA: IEEE Computer Society.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/14264
dc.identifier.doi10.1109/HICSS.2013.392
dc.description.abstract

Of the many possible insider threat attack vectors the increasing adoption of social media technologies and applications and the changing generational mindset of young prospective employees poses a particular challenge for maintaining security. This paper discusses an approach using network science techniques to map attack vectors and seeing the security problem as either a puzzle to be resolved or a mystery in need of better understanding.

dc.publisherIEEE Computer Society
dc.titleMapping Social Media Insider Threat Attack Vectors
dc.typeConference Paper
dcterms.source.startPage1840
dcterms.source.endPage1848
dcterms.source.titleProceedings of the 46th Hawaii International Conference on System Sciences
dcterms.source.seriesProceedings of the 46th Annual Hawaii International Conference on System Sciences
dcterms.source.isbn9781467359337
dcterms.source.conference46th Hawaii International Conference on System Sciences
dcterms.source.conference-start-dateJan 7 2013
dcterms.source.conferencelocationHawaii, USA
dcterms.source.placeWashington, USA
curtin.department
curtin.accessStatusFulltext not available


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record