Author of the publication

The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits.

, , and . HICSS, page 3518-3526. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts., and . AMCIS, page 421. Association for Information Systems, (2006)The Impact of Power Imbalance on Cyberbullying: the Role of Bystanders Intervention., and . ICIS, Association for Information Systems, (2020)An Empirical Investigation of the Impact of Data Quality and its Antecedents on Data Warehousing., and . AMCIS, page 28. Association for Information Systems, (2005)Ranking algorithms for digital forensic string search hits., and . Digit. Investig., 11 (Supplement 2): S124-S132 (2014)Web Services Security: Proposed Model for Content Delivery Assurance in a Low Trust Scenario., , and . AMCIS, page 513. Association for Information Systems, (2004)Clustering digital forensic string search output., and . Digital Investigation, 11 (4): 314-322 (2014)The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits., , and . HICSS, page 3518-3526. IEEE Computer Society, (2015)Exploring a Systematic Approach to Malware Threat Assessment., , and . HICSS, page 5517-5526. IEEE Computer Society, (2016)Examination of Organizational Information Security Strategy: A Pilot Study., and . AMCIS, page 417. Association for Information Systems, (2009)IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers., , , and . Digit. Investig., (2020)