Back to Results
First PageMeta Content
Cyberwarfare / Data security / Crime prevention / National security / Information security / Vulnerability / Threat / Security controls / Network security / Security / Computer security / Computer network security


Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute
Add to Reading List

Document Date: 2015-03-18 10:54:09


Open Document

File Size: 678,17 KB

Share Result on Facebook

City

Salt Lake City / /

Company

LA Times / BT / Good Data Systems / PricewaterhouseCoopers LLP / D. Ashenden / /

/

Facility

Cardiff University / University of Oxford / University of Leicester / /

IndustryTerm

internet access / technology sector / anti-virus software / removable device / technology journal / software training / threat prediction tool / appropriate anti-virus software / insecure device / removable devices / secure file server / finance / software packages / information technology crimes / ecommerce age / web server / law enforcement / /

Organization

Centre for the Protection of National Infrastructure / University of Leicester / Cardiff University / Sadie Creese Cyber Security Centre / Department for Business Innovation & Skills / University of Oxford / red cross / Department for Business / Innovation and Skills / Department of Computer Science / Local government / /

Person

R. W. Boss / Sadie Creese Cyber / O. Buckley / Jason R. C. Nurse / Philip A. Legg / I. Angermeier / L. J. Kirsch / Sasse / S. R. Boss / R. A. Shingler / /

/

Position

Actor / Governor / representative / Nurse / /

ProvinceOrState

Hawaii / /

PublishedMedium

Information Systems Research / The CERT guide / /

Technology

information technology / html / anti-virus software / pdf / web server / /

URL

http /

SocialTag