Greitzer, FL, J Purl, DE Becker, P Sticha, & YM Leong. (2019). "Modeling expert judgments of insider threat using ontology structure: Effects of individual indicator threat value and class membership." 52nd Hawaii International Conference on Systems Sciences (HICSS-52), Maui, Hawaii, January 2019, pp. 3202-3211. Download .
Greitzer, FL, J Purl, YM Leong & DE Becker. (2018). “SOFIT: Sociotechnical and Organizational Factors for Insider Threat.” IEEE Symposium on Security & Privacy, Workshop on Research for Insider Threat (WRIT), San Francisco, CA, May 24, 2018. Download paper.
Greitzer, FL, M Imran, J Purl, ET Axelrad, YM Leong, DE Becker, KB Laskey, and PJ Sticha. (2016). “Developing an ontology for individual and organizational sociotechnical indicators of insider threat risk.” The Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS 2016), Fairfax, VA, November 15-16, 2016. Download paper. Download presentation.
Cowley, J, and FL Greitzer. (2015). “Organizational impacts to cybersecurity expertise development and maintenance: A qualitative research study.” Human Factors and Ergonomics Society (HFES) International Annual Meeting, Los Angeles, CA, October 26-30, 2015. Download
Cowley, J, FL Greitzer, and B Woods. (2015). “Effect of network infrastructure factors on information system risk assessment.” Computers & Security, 52, 142-158. doi:10.1016/j.cose.2015.04.011 Download
Cowley, J, FL Greitzer, and B Woods. (2015). “Factors influencing network risk judgments: A conceptual inquiry and exploratory analysis.” Security Informatics, 4(1) (April 10, 2015). Download
Carroll, TE, FL Greitzer, and A Roberts. (2014). “Security informatics research challenges for mitigating cyber friendly fire.” Security Informatics, 3:13 (25 September 2014). Download
Greitzer, FL, J Strozer, S Cohen, A Moore, D Mundie, and J Cowley. (2014). “Analysis of unintentional insider threats deriving from social engineering exploits.” IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT), San Jose, CA, May 17-18, 2014. Download
Greitzer, FL, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, and D Mundie. (2014). “Unintentional insider threat: contributing factors, observables, and mitigation strategies.” 47th Hawaii International Conference on Systems Sciences (HICSS-47), Big Island, Hawaii. Download
Brown C, FL Greitzer, and A Watkins. (2013). “Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media.” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. Download
Greitzer, FL, LJ Kangas, CF Noonan, CR Brown and T Ferryman. (2013). "Psychosocial modeling of insider threat risk based on behavioral and word use analysis." e-Service Journal, 9(1), 106-138. Download
Greitzer, F.L. and T.A. Ferryman. (2013). Methods and metrics for evaluating analytic insider threat tools. 2013. IEEE Security and Privacy Workshops: Workshop on Research for Insider Threat. San Francisco, CA., pp. 90-97. Download
Greitzer FL, TE Carroll and AD Roberts. (2013). “Cyber friendly fire: Research challenges for security informatics.” IEEE International Conference on Intelligence and Security Informatics. Seattle, WA, June 4-7. Download
Brown, CR., A Watkins, & FL Greitzer. (2013). "Predicting insider threat risks through linguistic analysis of electronic communication." In 46th Hawaii International Conference on System Sciences (HICSS-47), Wailea, Maui, Hawaii. DOI: 10.1109/HICSS.2013.453 Download
Greitzer FL, LJ Kangas, CF Noonan, AC Dalton, and RE Hohimer. (2012). Identifying at-risk employees: A behavioral model for predicting potential insider threats. In 45th Hawaii International Conference on System Sciences (HICSS-46), Wailea, Maui, Hawaii, pp. 2392-2401.Download
Greitzer, FL, and RE Hohimer. (2011). "Modeling Human Behavior to Anticipate Insider Attacks." Journal of Strategic Security 4(2) :25-48.Download
Greitzer, FL, DA Frincke, and MM Zabriskie. (2011). “Social/Ethical Issues in Predictive Insider Threat Monitoring.” In: MJ Dark (Ed.), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Hershey, Pennsylvania: IGI Global. Chapter 7, pp.132-161. Download
Greitzer, FL, and DA Frincke. (2010). "Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation." In: CW Probst, J Hunter, D Gollmann & M Bishop (Eds.), Insider Threats in Cyber Security, New York: Springer, pp. 85-113. Download
Greitzer, FL, AP Moore, DM Cappelli, DH Andrews, L Carroll, and TD Hull. (2008). "Combating the Insider Cyber Threat." IEEE Security & Privacy, 6(1): 61-64. Download