Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Changing organizational attitudes: H...
~
VanBaaren, Joseph M.
Linked to FindBook
Google Book
Amazon
博客來
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs./
Author:
VanBaaren, Joseph M.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
Description:
52 p.
Notes:
Source: Masters Abstracts International, Volume: 55-04.
Contained By:
Masters Abstracts International55-04(E).
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10102312
ISBN:
9781339661209
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
VanBaaren, Joseph M.
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 52 p.
Source: Masters Abstracts International, Volume: 55-04.
Thesis (M.S.)--Utica College, 2016.
Cybersecurity practitioners are able to change organizational attitudes toward potentially expensive insider threat program components by shifting from traditional, security-based reasoning to identifying inefficiency and reducing costs. The intent of this research was to evaluate existing countermeasures used against malicious insiders to determine how detection, deterrence and mitigation strategies can be enhanced. An evaluation of the approach used by major insider threat research efforts was conducted; resulting in the discovery of significant discrepancies between governmental, academic and professional understandings of this problem. This paper identified techniques that can be used to shape the workplace environment to combat insider threats by combining the efforts of cybersecurity professionals and the human resources and legal departments of an organization. It also revealed ways that additional data feeds can be incorporated into detection methods, such as those obtained through the collection of open source intelligence and through practices such as positive social engineering. This paper concluded by addressing what an organization can do to defend itself against insider threats through the application of current legal standards to existing agreements. Refinements in the approach used to detect, deter and mitigate the actions of insider threats are warranted. Businesses can realize reduced operating costs by adapting institutional policies and procedures against malicious insider threats through the application of creative and flexible countermeasures.
ISBN: 9781339661209Subjects--Topical Terms:
532993
Information technology.
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
LDR
:02607nmm a2200313 4500
001
2121686
005
20170811100930.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339661209
035
$a
(MiAaPQ)AAI10102312
035
$a
AAI10102312
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
VanBaaren, Joseph M.
$3
3283614
245
1 0
$a
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
52 p.
500
$a
Source: Masters Abstracts International, Volume: 55-04.
500
$a
Includes supplementary digital materials.
500
$a
Adviser: Albert Orbinati.
502
$a
Thesis (M.S.)--Utica College, 2016.
520
$a
Cybersecurity practitioners are able to change organizational attitudes toward potentially expensive insider threat program components by shifting from traditional, security-based reasoning to identifying inefficiency and reducing costs. The intent of this research was to evaluate existing countermeasures used against malicious insiders to determine how detection, deterrence and mitigation strategies can be enhanced. An evaluation of the approach used by major insider threat research efforts was conducted; resulting in the discovery of significant discrepancies between governmental, academic and professional understandings of this problem. This paper identified techniques that can be used to shape the workplace environment to combat insider threats by combining the efforts of cybersecurity professionals and the human resources and legal departments of an organization. It also revealed ways that additional data feeds can be incorporated into detection methods, such as those obtained through the collection of open source intelligence and through practices such as positive social engineering. This paper concluded by addressing what an organization can do to defend itself against insider threats through the application of current legal standards to existing agreements. Refinements in the approach used to detect, deter and mitigate the actions of insider threats are warranted. Businesses can realize reduced operating costs by adapting institutional policies and procedures against malicious insider threats through the application of creative and flexible countermeasures.
590
$a
School code: 1754.
650
4
$a
Information technology.
$3
532993
650
4
$a
Intellectual property.
$3
572975
650
4
$a
Organizational behavior.
$3
516683
690
$a
0489
690
$a
0513
690
$a
0703
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
55-04(E).
790
$a
1754
791
$a
M.S.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10102312
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9332302
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login