Representative Publications in Cybersecurity and insider threat

Cybersecurity and Counterintelligence

Greitzer, FL, J Purl, YM Leong, & PJ Sticha (2019). Positioning your organization to respond to insider threats. IEEE Engineering Management Review. Download

Greitzer, FL, J Lee, J Purl, & AK Zaidi. (2019). Design and implementation of a comprehensive insider threat ontology. 17th Annual Conference on Systems Engineering Research (CSER). Washington, DC, April 2019, Download

Greitzer, FL, J Purl, DE Becker, P Sticha, & YM Leong. (2019). "Modeling expert judgments of insider threat using ontology structure: Effects of individual indicator threat value and class membership." 52nd Hawaii International Conference on Systems Sciences (HICSS-52), Maui, Hawaii, January 2019, pp. 3202-3211. Download

Greitzer, FL, J Purl, YM Leong & DE Becker. (2018). “SOFIT: Sociotechnical and Organizational Factors for Insider Threat.” IEEE Symposium on Security & Privacy, Workshop on Research for Insider Threat (WRIT), San Francisco, CA, May 24, 2018. Download

Greitzer, FL, M Imran, J Purl, ET Axelrad, YM Leong, DE Becker, KB Laskey, and PJ Sticha. (2016). “Developing an ontology for individual and organizational sociotechnical indicators of insider threat risk.” The Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS 2016), Fairfax, VA, November 15-16, 2016. Download paper. Download presentation.

Cowley, J, and FL Greitzer. (2015). “Organizational impacts to cybersecurity expertise development and maintenance: A qualitative research study.” Human Factors and Ergonomics Society (HFES) International Annual Meeting, Los Angeles, CA, October 26-30, 2015. Download 

Cowley, J, FL Greitzer, and B Woods. (2015). “Effect of network infrastructure factors on information system risk assessment.”  Computers & Security, 52, 142-158. doi:10.1016/j.cose.2015.04.011 Download

Cowley, J, FL Greitzer, and B Woods. (2015). “Factors influencing network risk judgments: A conceptual inquiry and exploratory analysis.” Security Informatics, 4(1) (April 10, 2015).  Download

Carroll, TE, FL Greitzer, and A Roberts. (2014). “Security informatics research challenges for mitigating cyber friendly fire.” Security Informatics, 3:13 (25 September 2014). Download

Greitzer, FL, J Strozer, S Cohen, A Moore, D Mundie, and J Cowley. (2014).  “Analysis of unintentional insider threats deriving from social engineering exploits.” IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT), San Jose, CA, May 17-18, 2014. Download  ​

Greitzer, FL, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, and D Mundie. (2014).  “Unintentional insider threat: contributing factors, observables, and mitigation strategies.” 47th Hawaii International Conference on Systems Sciences (HICSS-47), Big Island, Hawaii. Download 

Brown C, FL Greitzer, and A Watkins. (2013). “Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media.” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. Download 

Greitzer, FL, LJ Kangas, CF Noonan, CR Brown and T Ferryman. (2013). "Psychosocial modeling of insider threat risk based on behavioral and word use analysis." e-Service Journal, 9(1), 106-138. Download

Greitzer, F.L. and T.A. Ferryman. (2013). Methods and metrics for evaluating analytic insider threat tools. 2013. IEEE Security and Privacy Workshops: Workshop on Research for Insider Threat. San Francisco, CA., pp. 90-97. Download

Greitzer FL, TE Carroll and AD Roberts. (2013). “Cyber friendly fire: Research challenges for security informatics.” IEEE International Conference on Intelligence and Security Informatics. Seattle, WA, June 4-7. Download

Brown, CR., A Watkins, & FL Greitzer. (2013). "Predicting insider threat risks through linguistic analysis of electronic communication." In 46th Hawaii International Conference on System Sciences (HICSS-47), Wailea, Maui, Hawaii. DOI: 10.1109/HICSS.2013.453​ Download

Greitzer FL, LJ Kangas, CF Noonan, AC Dalton, and RE Hohimer. (2012). Identifying at-risk employees: A behavioral model for predicting potential insider threats. In 45th Hawaii International Conference on System Sciences (HICSS-46), Wailea, Maui, Hawaii, pp. 2392-2401.Download 

Greitzer, FL, and RE Hohimer.  (2011).  "Modeling Human Behavior to Anticipate Insider Attacks."  Journal of Strategic Security 4(2) :25-48.Download 

Greitzer, FL, DA Frincke, and MM Zabriskie. (2011). “Social/Ethical Issues in Predictive Insider Threat Monitoring.”  In: MJ Dark (Ed.), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Hershey, Pennsylvania: IGI Global. Chapter 7, pp.132-161. Download 

Greitzer, FL, and DA Frincke.  (2010).  "Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation."  In: CW Probst, J Hunter, D Gollmann & M Bishop (Eds.), Insider Threats in Cyber Security, New York: Springer, pp. 85-113. Download

Greitzer, FL, AP Moore, DM Cappelli, DH Andrews, L Carroll, and TD Hull. (2008).  "Combating the Insider Cyber Threat."  IEEE Security & Privacy, 6(1): 61-64. Download