Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
PDF
Publisher pdf
Language: English |
|
Download this file (PDF/180kB) |
|
Request a format suitable for use with assistive technology e.g. a screenreader | |
Official URL: http://dx.doi.org/10.22667/JOWUA.2017.03.31.001 |
Abstract
As society has embraced technology and systems to promote services, trade and ubiquitous communication, it has also inadvertently exposed itself to a plethora of security risks. One of the most significant of these risks is that of insider threat, where privileged insiders (be they employees or trusted third-parties) within an enterprise, intentionally or inadvertently cause harm their organisations. While the topic of insider threat has been examined and researched for decades, the problem still persists, and some would even argue that it is becoming worse. Could this be the result of a disconnect between approaches and solutions being researched and those that are (or can be) actually implemented?
Item Type: | Article |
---|---|
DOI/Identification number: | 10.22667/JOWUA.2017.03.31.001 |
Subjects: |
Q Science T Technology |
Divisions: | Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing |
Depositing User: | Jason Nurse |
Date Deposited: | 03 Jul 2018 17:03 UTC |
Last Modified: | 05 Nov 2024 11:07 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/67469 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):