Show simple item record

dc.contributor.authorMunshi, Asmaa
dc.contributor.editorPiet Kommers
dc.contributor.editorTomayess Issa
dc.contributor.editorPedro Isaias
dc.date.accessioned2017-01-30T15:09:31Z
dc.date.available2017-01-30T15:09:31Z
dc.date.created2011-03-27T20:02:19Z
dc.date.issued2010
dc.identifier.citationMunshi, Asmaa M. 2010. A study of insider threat behaviour: developing a holistic framework, in Kommers, P. and Issa, T. and Isaias, P. (ed), IADIS International Conference - Internet Technologies and Society 2010, Nov 29 2010, pp. 343-348. Perth, WA: IADIS press.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/43737
dc.description.abstract

This research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research will be conducted by data collection in three phases: academic research sources published legal cases, and managment and business sources. The study results will develop insider threat behaviour model. This model will be assessed by focus group prior to building the framework. Later, a management framework will be developed to manage insider threat behaviour. Finally, to ensure the practicality of the new framework a focus group will assess the management framework.

dc.publisherIADIS press
dc.subjectdesigns science methodology
dc.subjectmanagement framework
dc.subjectinsider threat behaviour
dc.subjectconceptual model
dc.subjectholistic view
dc.subjectInsider threat
dc.titleA study of insider threat behaviour: developing a holistic framework
dc.typeConference Paper
dcterms.source.startPage343
dcterms.source.endPage348
dcterms.source.titleProceedings of the IADIS international conference: Internet Technologies and Society 2010
dcterms.source.seriesProceedings of the IADIS international conference: Internet Technologies and Society 2010
dcterms.source.isbn9789728939311
dcterms.source.conferenceIADIS International Conference - Internet Technologies and Society 2010
dcterms.source.conference-start-dateNov 29 2010
dcterms.source.conferencelocationPerth, Australia
dcterms.source.placePerth, Australia
curtin.note

This is a reprint from a paper published in the Proceedings of the IADIS International Conferences. The conference paper can be found on the IADIS website: http://www.iadis.org

curtin.departmentSchool of Information Systems
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record