Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] The whole of cyber defense: Syncing practice and theory
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits
M Maasberg, J Warren… - 2015 48th Hawaii …, 2015 - ieeexplore.ieee.org
Efforts to understand what goes on in the mind of an insider have taken a back seat to
develo** technical controls, yet insider threat incidents persist. We examine insider threat …
develo** technical controls, yet insider threat incidents persist. We examine insider threat …
Organisational information security strategy: Review, discussion and future research
Dependence on information, including for some of the world's largest organisations such as
governments and multi-national corporations, has grown rapidly in recent years. However …
governments and multi-national corporations, has grown rapidly in recent years. However …
A study of social networking site use from a three-pronged security and privacy threat assessment perspective
This study focuses on how social networking site (SNS) users' perceived risk is affected by
perceptions of the duality of potentially harmful events (cyber-attacks and privacy breaches) …
perceptions of the duality of potentially harmful events (cyber-attacks and privacy breaches) …
Understanding organisational responses to regulative pressures in information security management: The case of a Chinese hospital
This paper advances existing theoretical understanding of the factors impacting upon
organisational responses to regulative pressures in the process of information security …
organisational responses to regulative pressures in the process of information security …
A theory on information security
This paper proposes a theory on information security. We argue that information security is
imperfectly understood and aim to bring about an altered understanding of why efforts are …
imperfectly understood and aim to bring about an altered understanding of why efforts are …
Understanding the effects of situational crime prevention and personality factors on insider compliance
K Padayachee - Journal of Information Security and Applications, 2022 - Elsevier
This study investigated the moderating effects of situational factors and personality factors
on an insider's attitude towards insider compliance within the domain of information security …
on an insider's attitude towards insider compliance within the domain of information security …
Multiple case study approach to identify aggravating variables of insider threats in information systems
Malicious insiders present a serious threat to information systems due to privilege of access,
knowledge of internal computer resources, and potential threats on the part of disgruntled …
knowledge of internal computer resources, and potential threats on the part of disgruntled …
[HTML][HTML] Using Situational Crime Prevention (SCP) to prevent cybercrimes
H Ho - 2024 - irr.singaporetech.edu.sg
AbstractThe COVID-19 pandemic accelerated digital growth in cyberspace for consumers
and businesses alike. The increase in digital growth also brings greater opportunities for …
and businesses alike. The increase in digital growth also brings greater opportunities for …
A conceptual opportunity-based framework to mitigate the insider threat
K Padayachee - 2013 Information Security for South Africa, 2013 - ieeexplore.ieee.org
The aim of this paper is to provide a conceptual framework to mitigate the insider threat from
an opportunity-based perspective. Although motive and opportunity are required to commit …
an opportunity-based perspective. Although motive and opportunity are required to commit …