Insider threat: A critical review of the literature
Access Status
Fulltext not available
Authors
Munshi, Asmaa
Issa, Tomayess
Date
2012Type
Conference Paper
Metadata
Show full item recordCitation
Munshi, Asmaa and Issa, Tomayess. 2012. Insider threat: A critical review of the literature in Kommers, P. and Tomayess, I. and Isalas, P. (ed), Proceedings of the IADIS International Conference on Internet Technologies & Society (ITS 2012), Nov 28-30 2012, pp. 151-158. Perth, WA: International Association for Development of the Information Society (IADIS).
Source Title
internat technologies & society 2012
Source Conference
IADIS International Conference - internat technologies & society 2012
ISBN
Collection
Abstract
Threat from internal sources is one of the most serious problems organizations word-wide encounter nowadays as it is difficult to overcome. Currently, all organizations and sectors are facing the insider threats' problems to computer assets. This paper presents a descriptive literature review about insider threat and some classification, for example: insiders and insider threat definitions, and the classification of the insider attack. Moreover, the paper aims to examine the current and previous academic literature to identify the risks associated with insider threats, and finally, it describes some of the previous insider threat models and some of the future research ideas.
Related items
Showing items related by title, author, creator and subject.
-
Prabhu, sunitha; Thompson, Nik (2020)Prior work on insider threat classification has adopted a range of definitions, constructs, and terminology, making it challenging to compare studies. We address this issue by introducing a unified insider threat ...
-
Munshi, Asmaa Mahdi (2013)This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed ...
-
Munshi, Asmaa (2010)This research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research will be conducted by data collection in three phases: academic research sources published legal cases, and ...