Skip to main content

Guest editorial: Insider threat solutions - moving from concept to reality

Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)

PDF Publisher pdf
Language: English
Download (180kB)
[thumbnail of jowua-v8n1-0.pdf]
This file may not be suitable for users of assistive technology.
Request an accessible format
Official URL:


As society has embraced technology and systems to promote services, trade and ubiquitous communication, it has also inadvertently exposed itself to a plethora of security risks. One of the most significant of these risks is that of insider threat, where privileged insiders (be they employees or trusted third-parties) within an enterprise, intentionally or inadvertently cause harm their organisations. While the topic of insider threat has been examined and researched for decades, the problem still persists, and some would even argue that it is becoming worse. Could this be the result of a disconnect between approaches and solutions being researched and those that are (or can be) actually implemented?

Item Type: Article
DOI/Identification number: 10.22667/JOWUA.2017.03.31.001
Subjects: Q Science
T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Jason Nurse
Date Deposited: 03 Jul 2018 17:03 UTC
Last Modified: 08 Dec 2022 22:02 UTC
Resource URI: (The current URI for this page, for reference purposes)
Nurse, Jason R. C.:
  • Depositors only (login required):


Downloads per month over past year