Representative Publications in Cybersecurity and insider threat

Cybersecurity and Counterintelligence

Greitzer, FL, J Purl, YM Leong & DE Becker. (2018). “SOFIT: Sociotechnical and Organizational Factors for Insider Threat.” IEEE Symposium on Security & Privacy, Workshop on Research for Insider Threat (WRIT), San Francisco, CA, May 24, 2018.


Greitzer, FL, M Imran, J Purl, ET Axelrad, YM Leong, DE Becker, KB Laskey, and PJ Sticha. (2016). “Developing an ontology for individual and organizational sociotechnical indicators of insider threat risk.” The Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS 2016), Fairfax, VA, November 15-16, 2016. Download paper. Download presentation.

Cowley, J, and FL Greitzer. (2015). “Organizational impacts to cybersecurity expertise development and maintenance: A qualitative research study.” Human Factors and Ergonomics Society (HFES) International Annual Meeting, Los Angeles, CA, October 26-30, 2015. Download 


Cowley, J, FL Greitzer, and B Woods. (2015). “Effect of network infrastructure factors on information system risk assessment.”  Computers & Security, 52, 142-158. doi:10.1016/j.cose.2015.04.011 Download


Cowley, J, FL Greitzer, and B Woods. (2015). “Factors influencing network risk judgments: A conceptual inquiry and exploratory analysis.” Security Informatics, 4(1) (April 10, 2015).  Download


Carroll, TE, FL Greitzer, and A Roberts. (2014). “Security informatics research challenges for mitigating cyber friendly fire.” Security Informatics, 3:13 (25 September 2014). Download


Greitzer, FL, J Strozer, S Cohen, A Moore, D Mundie, and J Cowley. (2014).  “Analysis of unintentional insider threats deriving from social engineering exploits.” IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT), San Jose, CA, May 17-18, 2014. Download  ​


Greitzer, FL, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, and D Mundie. (2014).  “Unintentional insider threat: contributing factors, observables, and mitigation strategies.” 47th Hawaii International Conference on Systems Sciences (HICSS-47), Big Island, Hawaii. Download 


Brown C, FL Greitzer, and A Watkins. (2013). “Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media.” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. Download 


Greitzer, FL, LJ Kangas, CF Noonan, CR Brown and T Ferryman. (2013). "Psychosocial modeling of insider threat risk based on behavioral and word use analysis." e-Service Journal, 9(1), 106-138. Download


Greitzer, F.L. and T.A. Ferryman. (2013). Methods and metrics for evaluating analytic insider threat tools. 2013. IEEE Security and Privacy Workshops: Workshop on Research for Insider Threat. San Francisco, CA., pp. 90-97. Download


Greitzer FL, TE Carroll and AD Roberts. (2013). “Cyber friendly fire: Research challenges for security informatics.” IEEE International Conference on Intelligence and Security Informatics. Seattle, WA, June 4-7. Download


Brown, CR., A Watkins, & FL Greitzer. (2013). "Predicting insider threat risks through linguistic analysis of electronic communication." In 46th Hawaii International Conference on System Sciences (HICSS-47), Wailea, Maui, Hawaii. DOI: 10.1109/HICSS.2013.453​ Download


Greitzer FL, LJ Kangas, CF Noonan, AC Dalton, and RE Hohimer. (2012). Identifying at-risk employees: A behavioral model for predicting potential insider threats. In 45th Hawaii International Conference on System Sciences (HICSS-46), Wailea, Maui, Hawaii, pp. 2392-2401.Download 


Greitzer, FL, and RE Hohimer.  (2011).  "Modeling Human Behavior to Anticipate Insider Attacks."  Journal of Strategic Security 4(2) :25-48.Download 


Greitzer, FL, DA Frincke, and MM Zabriskie. (2011). “Social/Ethical Issues in Predictive Insider Threat Monitoring.”  In: MJ Dark (Ed.), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Hershey, Pennsylvania: IGI Global. Chapter 7, pp.132-161. Download 


Greitzer, FL, and DA Frincke.  (2010).  "Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation."  In: CW Probst, J Hunter, D Gollmann & M Bishop (Eds.), Insider Threats in Cyber Security, New York: Springer, pp. 85-113. Download

Greitzer, FL, AP Moore, DM Cappelli, DH Andrews, L Carroll, and TD Hull. (2008).  "Combating the Insider Cyber Threat."  IEEE Security & Privacy, 6(1): 61-64. Download