Search Results - Leak, R. K~

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    A multiple-perspective approach for insider-threat risk prediction in cyber-security by Nebrase Elmrabit

    Published 2018
    “…We review case studies of insider crimes to understand how authorised users could harm their organisations by dividing these cases into seven groups based on insider threat categories as follows: a) insider IT sabotage, b) insider IT fraud, c) insider theft of intellectual property, d) insider social engineering, e) unintentional insider threat incident, f) insider in cloud computing, and g) insider national security. …”
    Get full text
    Default Thesis