[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

The dark side of the insider: detecting the insider threat through examination of dark triad personality traits

M Maasberg, J Warren… - 2015 48th Hawaii …, 2015 - ieeexplore.ieee.org
Efforts to understand what goes on in the mind of an insider have taken a back seat to
develo** technical controls, yet insider threat incidents persist. We examine insider threat …

Organisational information security strategy: Review, discussion and future research

CA Horne, SB Maynard, A Ahmad - Australasian Journal of …, 2017 - journal.acs.org.au
Dependence on information, including for some of the world's largest organisations such as
governments and multi-national corporations, has grown rapidly in recent years. However …

A study of social networking site use from a three-pronged security and privacy threat assessment perspective

R Chen, DJ Kim, HR Rao - Information & Management, 2021 - Elsevier
This study focuses on how social networking site (SNS) users' perceived risk is affected by
perceptions of the duality of potentially harmful events (cyber-attacks and privacy breaches) …

Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital

Y Hou, P Gao, B Nicholson - Technological Forecasting and Social Change, 2018 - Elsevier
This paper advances existing theoretical understanding of the factors impacting upon
organisational responses to regulative pressures in the process of information security …

A theory on information security

CA Horne, A Ahmad, SB Maynard - 2016 - aisel.aisnet.org
This paper proposes a theory on information security. We argue that information security is
imperfectly understood and aim to bring about an altered understanding of why efforts are …

Understanding the effects of situational crime prevention and personality factors on insider compliance

K Padayachee - Journal of Information Security and Applications, 2022 - Elsevier
This study investigated the moderating effects of situational factors and personality factors
on an insider's attitude towards insider compliance within the domain of information security …

Multiple case study approach to identify aggravating variables of insider threats in information systems

M Nicho, F Kamoun - … of the Association for Information Systems, 2014 - aisel.aisnet.org
Malicious insiders present a serious threat to information systems due to privilege of access,
knowledge of internal computer resources, and potential threats on the part of disgruntled …

[HTML][HTML] Using Situational Crime Prevention (SCP) to prevent cybercrimes

H Ho - 2024 - irr.singaporetech.edu.sg
AbstractThe COVID-19 pandemic accelerated digital growth in cyberspace for consumers
and businesses alike. The increase in digital growth also brings greater opportunities for …

A conceptual opportunity-based framework to mitigate the insider threat

K Padayachee - 2013 Information Security for South Africa, 2013 - ieeexplore.ieee.org
The aim of this paper is to provide a conceptual framework to mitigate the insider threat from
an opportunity-based perspective. Although motive and opportunity are required to commit …