A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP)

作者: Solomon Mekonnen Tekle

DOI:

关键词:

摘要:

参考文章(144)
David T. Wolfe, Dana R. Hermanson, The Fraud Diamond: Considering the Four Elements of Fraud ,(2004)
Frank L. Greitzer, Deborah Frincke, Mariah Zabriskie, Social/Ethical Issues in Predictive Insider Threat Monitoring IGI Global. pp. 1100- 1129 ,(2011) , 10.4018/978-1-61350-323-2.CH506
Khaled El Emam, Fida Kamal Dankar, Protecting privacy using k-anonymity. Journal of the American Medical Informatics Association. ,vol. 15, pp. 627- 637 ,(2008) , 10.1197/JAMIA.M2716
Aris Gkoulalas-Divanis, Grigorios Loukides, Overview of Patient Data Anonymization Springer, New York, NY. pp. 9- 30 ,(2013) , 10.1007/978-1-4614-5668-1_2
James V. Hansen, Ned C. Hill, Control and audit of electronic data interchange Management Information Systems Quarterly. ,vol. 13, pp. 403- 413 ,(1989) , 10.2307/248724
Nader Sohrabi Safa, Mehdi Sookhak, Rossouw Von Solms, Steven Furnell, Norjihan Abdul Ghani, Tutut Herawan, None, Information security conscious care behaviour formation in organizations Computers & Security. ,vol. 53, pp. 65- 78 ,(2015) , 10.1016/J.COSE.2015.05.012
Juhani Iivari, A Paradigmatic Analysis of Information Systems As a Design Science Scandinavian Journal of Information Systems. ,vol. 19, pp. 5- ,(2007)
Zabihollah Rezaee, Richard Riley, Financial Statement Fraud: Prevention and Detection ,(2002)
Clay Posey, , Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, James F. Courtney, , , , , Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors MIS Quarterly. ,vol. 37, pp. 1189- 1210 ,(2013) , 10.25300/MISQ/2013/37.4.09
Christopher Pearson Fazekas, 1984 Is Still Fiction: Electronic Monitoring in the Workplace and U.S. Privacy Law Duke law and technology review. ,vol. 3, pp. 1- 17 ,(2004)