Author of the publication

Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies.

, , , , , , and . HICSS, page 2025-2034. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A pattern for increased monitoring for intellectual property theft by departing insiders., , and . PLoP, page 19:1-19:10. ACM, (2011)Parallel Processing in Ada., and . Computer, 19 (8): 20-25 (1986)Insider Threat Defined: Discovering the Prototypical Case., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (2): 7-23 (2014)Using Ada 95 for embedded applications.. TRI-Ada, page 390-393. ACM, (1995)Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies., , , , , , and . HICSS, page 2025-2034. IEEE Computer Society, (2014)Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 236-250. IEEE Computer Society, (2014)An Ontology for Malware Analysis., and . ARES, page 556-558. IEEE Computer Society, (2013)Building an Incident Management Body of Knowledge., and . ARES, page 507-513. IEEE Computer Society, (2012)Rule-Based COTS Integration., , and . J. Res. Pract. Inf. Technol., 35 (3): 197-204 (2003)The Problem of Anomalous Data., and . Markup Languages, 1 (4): 1-19 (1999)