Back to Results
First PageMeta Content
Threat / Insider / Computing / Data mining / Georgia Tech Research Institute / Cyber Insider Threat / Insider trading / Computer security / Computer network security / Cyberwarfare


A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches Jason R.C. Nurse1 , Philip A. Legg1 , Oliver Buckley1 , Ioannis Agrafiotis1 , Gordon Wright2 , Monica
Add to Reading List

Document Date: 2014-07-17 08:03:36


Open Document

File Size: 179,37 KB

Share Result on Facebook

Company

Ford / Fannie Mae / Symantec / Raytheon / Twitter / Facebook / /

Country

United Kingdom / /

Currency

USD / /

/

Event

Product Issues / /

Facility

University of Oxford / University of Leicester / /

IndustryTerm

detection systems / e-mail communications / storage devices / social media / prototype detection systems / preventative solutions / personal communications / software tools / detection tool / compromise systems / Social-media use / detection tools / law enforcement / online actions / social-networking information / intrusion-detection systems / Cloud services / /

Organization

University of Leicester / Cyber Security Centre / UK’s Centre for the Protection of National Infrastructure / Department of Computer Science / Department of Media and Communications / Sa¨ıd Business School / University of Oxford / /

Position

author / decision manager / Chief Executive Officer / Nurse / system analyst / /

Product

consideration / /

SocialTag