Preventing insider threats to enhance organizational security: The role of opportunity-reducing techniques

2021 ◽  
pp. 101670
Author(s):  
Myeongki Jeong ◽  
Hangjung Zo
Author(s):  
Shaun Joseph Smyth ◽  
Kevin Curran ◽  
Nigel McKelvey

Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.


2003 ◽  
Vol 18 (2) ◽  
pp. 93-101 ◽  
Author(s):  
Helga Drummond

This paper analyses how Nick Leeson exploited information technology (IT) in order to trade without authority and thereby causing Barings Bank to collapse. What emerges suggests that, not only can IT systems enable malfeasance on a large scale, but that very little specialist knowledge is required in order to turn the computer into an accomplice. The most disturbing feature of the Barings Bank debacle is the contrast between the mundane act of suppressing a control mechanism and the consequences that flowed from this act. It is argued that organizational security ultimately lies in knowing the limits of one's information.


2022 ◽  
pp. 280-299
Author(s):  
Shaun Joseph Smyth ◽  
Kevin Curran ◽  
Nigel McKelvey

Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.


JAMA ◽  
1966 ◽  
Vol 195 (12) ◽  
pp. 1005-1009 ◽  
Author(s):  
D. J. Fernbach
Keyword(s):  

JAMA ◽  
1966 ◽  
Vol 195 (3) ◽  
pp. 167-172 ◽  
Author(s):  
T. E. Van Metre

2018 ◽  
Vol 41 ◽  
Author(s):  
Winnifred R. Louis ◽  
Craig McGarty ◽  
Emma F. Thomas ◽  
Catherine E. Amiot ◽  
Fathali M. Moghaddam

AbstractWhitehouse adapts insights from evolutionary anthropology to interpret extreme self-sacrifice through the concept of identity fusion. The model neglects the role of normative systems in shaping behaviors, especially in relation to violent extremism. In peaceful groups, increasing fusion will actually decrease extremism. Groups collectively appraise threats and opportunities, actively debate action options, and rarely choose violence toward self or others.


Sign in / Sign up

Export Citation Format

Share Document