Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Fujs, Damjan
Mihelič, Anže
and
Vrhovec, Simon L. R.
2019.
The power of interpretation.
p.
1.
Bedford, Justine
and
van der Laan, Luke
2021.
Operationalising a framework for organisational vulnerability to intentional insider threat: the OVIT as a valid and reliable diagnostic tool.
Journal of Risk Research,
Vol. 24,
Issue. 9,
p.
1180.
Rice, Charis
and
Searle, Rosalind H.
2022.
‘The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization’.
Management Communication Quarterly,
Vol. 36,
Issue. 3,
p.
467.
Whitty, Monica T.
Ruddy, Christopher
and
Keatley, David A.
2023.
Human Aspects of Information Security and Assurance.
Vol. 674,
Issue. ,
p.
377.
2023.
Cyber Threat Intelligence.
p.
31.
Whitty, Monica T.
2023.
Cybercrime in the Pandemic Digital Age and Beyond.
p.
57.
Vakulchik, O. V.
Mazepa, R. B.
and
Mikhaylov, V. Y.
2024.
Detection and Monitoring of Processes that Exploit the Cursor Mechanism, Provoking Locks in Information and Information Search Systems.
p.
1.
Marbut, A. R.
and
Harms, P. D.
2024.
Fiends and Fools: A Narrative Review and Neo-socioanalytic Perspective on Personality and Insider Threats.
Journal of Business and Psychology,
Vol. 39,
Issue. 3,
p.
679.
Whitelaw, Findlay
Riley, Jackie
and
Elmrabit, Nebrase
2024.
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services.
IEEE Access,
Vol. 12,
Issue. ,
p.
34752.
Liang, Nan
Biros, David P.
and
Luse, Andy
2024.
An Empirical Comparison of Malicious Insiders and Benign Insiders.
Journal of Computer Information Systems,
Vol. 64,
Issue. 6,
p.
762.
Phillips, Peter J.
and
Pohl, Gabriela
2024.
Industrial espionage: window of opportunity.
Information Security Journal: A Global Perspective,
p.
1.
Taylor, Jacqui
and
Whitty, Monica
2024.
An Exploration of the Awareness and Attitudes of Psychology Students Regarding Their Psychological Literacy for Working in the Cybersecurity Industry.
Psychology Learning & Teaching,
Vol. 23,
Issue. 2,
p.
298.
Whitty, Monica Therese
Ruddy, Christopher
Keatley, David
Butavicius, Marcus
and
Grobler, Marthie
2024.
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks.
Information & Computer Security,
Vol. 32,
Issue. 4,
p.
509.
Renaud, Karen
Warkentin, Merrill
Pogrebna, Ganna
and
van der Schyff, Karl
2024.
VISTA: An inclusive insider threat taxonomy, with mitigation strategies.
Information & Management,
Vol. 61,
Issue. 1,
p.
103877.
Holden, Heather
Munro, Victor
Tsakiris, Lina
and
Wilner, Alex
2024.
“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats.
Information Security Journal: A Global Perspective,
p.
1.