How to balance insider threats and employee privacy

被引:0
|
作者
机构
[1] Kohen, Isaac
来源
Kohen, Isaac | 1600年 / Information Systems Audit and Control Association (ISACA)卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Federated Platooning: Insider Threats and Mitigations
    Callegati, Franco
    Gabbrielli, Maurizio
    Giallorenzo, Saverio
    Melis, Andrea
    Prandini, Marco
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3222 - 3231
  • [32] Detecting Insider Threats: Solutions and Trends
    Zeadally, Sherali
    Yu, Byunggu
    Jeong, Dong Hyun
    Liang, Lily
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192
  • [33] Introduction to the Special Issue on Insider Threats
    Claycomb, Bill
    Greitzer, Frank
    Jaros, Stephanie L.
    Gardner, Carrie
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [34] Model Based Analysis of Insider Threats
    Chen, Taolue
    Han, Tingting
    Kammueller, Florian
    Nemli, Ibrahim
    Probst, Christian W.
    [J]. 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [35] How often is Employee Anger an Insider Risk I? Detecting and Measuring Negative Sentiment versus Insider Risk in Digital Communications
    Shaw, Eric
    Payri, Maria
    Cohn, Michael
    Shaw, Ilene R.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (01) : 39 - 72
  • [36] Threats to privacy protection
    Barash, Carol Isaacson
    [J]. SCIENCE, 2007, 318 (5852) : 913 - 914
  • [37] Monitoring technology in the American workplace: Would adopting English privacy standards better balance employee privacy and productivity?
    Evans, Laura
    [J]. CALIFORNIA LAW REVIEW, 2007, 95 (04) : 1115 - 1149
  • [38] EMPLOYEE LEASING - BENEFITS AND THREATS
    MUNCHUS, G
    [J]. PERSONNEL, 1988, 65 (07) : 59 - 61
  • [39] Towards Formal Analysis of Insider Threats for Auctions
    Kammuller, Florian
    Kerber, Manfred
    Probst, Christian W.
    [J]. MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
  • [40] Detecting and Preventing Cyber Insider Threats: A Survey
    Liu, Liu
    De Vel, Olivier
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417