How to balance insider threats and employee privacy

被引:0
|
作者
机构
[1] Kohen, Isaac
来源
Kohen, Isaac | 1600年 / Information Systems Audit and Control Association (ISACA)卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] BALANCE ON THE FINE LINE OF EMPLOYEE PRIVACY
    FLYNN, G
    [J]. PERSONNEL JOURNAL, 1995, 74 (03) : 90 - 90
  • [2] The insider threat and employee privacy: An overview of recent case law
    Huth, Carly L.
    [J]. COMPUTER LAW & SECURITY REVIEW, 2013, 29 (04) : 368 - 381
  • [3] Redefining insider threats: a distinction between insider hazards and insider threats
    Mathias Reveraert
    Tom Sauer
    [J]. Security Journal, 2021, 34 : 755 - 775
  • [4] Redefining insider threats: a distinction between insider hazards and insider threats
    Reveraert, Mathias
    Sauer, Tom
    [J]. SECURITY JOURNAL, 2021, 34 (04) : 755 - 775
  • [5] Insider or outsider? How employee perceptions of insider status affect their work behavior
    Stamper, CL
    Masterson, SS
    [J]. JOURNAL OF ORGANIZATIONAL BEHAVIOR, 2002, 23 (08) : 875 - 894
  • [6] Insider threats
    Hobbs, Christopher
    [J]. INTERNATIONAL AFFAIRS, 2019, 95 (03) : 725 - 726
  • [7] Restoring the balance: Employer liability and employee privacy
    Richman, A
    [J]. IOWA LAW REVIEW, 2001, 86 (04) : 1337 - 1361
  • [8] How to Balance Privacy with Authenticity
    Thorncharoensri, Pairat
    Susilo, Willy
    Mu, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 184 - 201
  • [9] How to Model Privacy Threats in the Automotive Domain
    Raciti, Mario
    Bella, Giampaolo
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS, VEHITS 2023, 2023, : 394 - 401
  • [10] Employee profiling via aspect-based sentiment and network for insider threats detection
    Soh, Charlie
    Yu, Sicheng
    Narayanan, Annamalai
    Duraisamy, Santhiya
    Chen, Lihui
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2019, 135 : 351 - 361