Greitzer, FL, RA Kliner & S Chan. (2022). Temporal effects of contributing factors in insider risk assessment: Insider threat indicator decay characteristics. Presented at ACSAC/WRIT Workshop, December 5, 2022, Austin, Texas USA. https://www.acsac.org/2022/workshops/writ/
Greitzer, FL, & J Purl. (2022). The dynamic nature of insider threat indicators. Springer Nature Computer Science, 3(102). https://doi.org/10.1007/s42979-021-00990-1. [Presented at the Workshop on Research for Insider Threat (WRIT), affiliated with 7th International Conference on Cyber Security and Privacy in Communication Networks (ICCS) 2021, 9-10 December 2021, Cardiff Metropolitan University-UK.]
Greitzer, FL, J Purl, PJ Sticha, MC Yu, & J Lee. (2021). Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 12(2), 3-47. June 2021. DOI:10.22667/JOWUA.2021.06.30.003 https://dx.doi.org/10.22667/JOWUA.2021.06.30.003
Supplementary files available at: http://isyou.info/jowua/abstracts/jowua-v12n2-1.htm
Greitzer, FL, W Li, KB Laskey, J Lee, & J Purl. (2021). Experimental Investigation of technical and human factors related to phishing susceptibility. ACM Transactions on Social Computing, 4(2), Article No. 8, June 2021, pp.1-48. https://doi.org/10.1145/3461672
Li, W, J Lee, J Purl, FL Greitzer, B Yousefi, & KB Laskey. (2020). Experimental investigation of demographic factors related to phishing susceptibility. 53rd Hawaii International Conference on Systems Sciences (HICSS-53), Maui, Hawaii, January 2020. Download
Greitzer, FL. (2019). Insider Threat: It’s the HUMAN, Stupid! Proceedings of the Northwest Cybersecurity Symposium, April 8-10, 2019. Article No. 4, pgs 1-8. ACM ISBN 978-1-4503-6614-4/19/04. Download
Greitzer, FL, J Purl, YM Leong, & PJ Sticha (2019). Positioning your organization to respond to insider threats. IEEE Engineering Management Review. Download
Greitzer, FL, J Lee, J Purl, & AK Zaidi. (2019). Design and implementation of a comprehensive insider threat ontology. 17th Annual Conference on Systems Engineering Research (CSER). Washington, DC, April 2019, Download
Greitzer, FL, J Purl, DE Becker, P Sticha, & YM Leong. (2019). "Modeling expert judgments of insider threat using ontology structure: Effects of individual indicator threat value and class membership." 52nd Hawaii International Conference on Systems Sciences (HICSS-52), Maui, Hawaii, January 2019, pp. 3202-3211. Download
Greitzer, FL, J Purl, YM Leong & DE Becker. (2018). “SOFIT: Sociotechnical and Organizational Factors for Insider Threat.” IEEE Symposium on Security & Privacy, Workshop on Research for Insider Threat (WRIT), San Francisco, CA, May 24, 2018. Download
Greitzer, FL, M Imran, J Purl, ET Axelrad, YM Leong, DE Becker, KB Laskey, and PJ Sticha. (2016). “Developing an ontology for individual and organizational sociotechnical indicators of insider threat risk.” The Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS 2016), Fairfax, VA, November 15-16, 2016. Download paper. Download presentation.
Cowley, J, and FL Greitzer. (2015). “Organizational impacts to cybersecurity expertise development and maintenance: A qualitative research study.” Human Factors and Ergonomics Society (HFES) International Annual Meeting, Los Angeles, CA, October 26-30, 2015. Download
Cowley, J, FL Greitzer, and B Woods. (2015). “Effect of network infrastructure factors on information system risk assessment.” Computers & Security, 52, 142-158. doi:10.1016/j.cose.2015.04.011 Download
Cowley, J, FL Greitzer, and B Woods. (2015). “Factors influencing network risk judgments: A conceptual inquiry and exploratory analysis.” Security Informatics, 4(1) (April 10, 2015). Download
Carroll, TE, FL Greitzer, and A Roberts. (2014). “Security informatics research challenges for mitigating cyber friendly fire.” Security Informatics, 3:13 (25 September 2014). Download
Greitzer, FL, J Strozer, S Cohen, A Moore, D Mundie, and J Cowley. (2014). “Analysis of unintentional insider threats deriving from social engineering exploits.” IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT), San Jose, CA, May 17-18, 2014. Download
Greitzer, FL, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, and D Mundie. (2014). “Unintentional insider threat: contributing factors, observables, and mitigation strategies.” 47th Hawaii International Conference on Systems Sciences (HICSS-47), Big Island, Hawaii. Download
Brown C, FL Greitzer, and A Watkins. (2013). “Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media.” Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, Illinois, August 15-17, 2013. Download
Greitzer, FL, LJ Kangas, CF Noonan, CR Brown and T Ferryman. (2013). "Psychosocial modeling of insider threat risk based on behavioral and word use analysis." e-Service Journal, 9(1), 106-138. Download
Greitzer, F.L. and T.A. Ferryman. (2013). Methods and metrics for evaluating analytic insider threat tools. 2013. IEEE Security and Privacy Workshops: Workshop on Research for Insider Threat. San Francisco, CA., pp. 90-97. Download
Greitzer FL, TE Carroll and AD Roberts. (2013). “Cyber friendly fire: Research challenges for security informatics.” IEEE International Conference on Intelligence and Security Informatics. Seattle, WA, June 4-7. Download
Brown, CR., A Watkins, & FL Greitzer. (2013). "Predicting insider threat risks through linguistic analysis of electronic communication." In 46th Hawaii International Conference on System Sciences (HICSS-47), Wailea, Maui, Hawaii. DOI: 10.1109/HICSS.2013.453 Download
Greitzer FL, LJ Kangas, CF Noonan, AC Dalton, and RE Hohimer. (2012). Identifying at-risk employees: A behavioral model for predicting potential insider threats. In 45th Hawaii International Conference on System Sciences (HICSS-46), Wailea, Maui, Hawaii, pp. 2392-2401.Download
Greitzer, FL, and RE Hohimer. (2011). "Modeling Human Behavior to Anticipate Insider Attacks." Journal of Strategic Security 4(2) :25-48.Download
Greitzer, FL, DA Frincke, and MM Zabriskie. (2011). “Social/Ethical Issues in Predictive Insider Threat Monitoring.” In: MJ Dark (Ed.), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. Hershey, Pennsylvania: IGI Global. Chapter 7, pp.132-161. Download
Greitzer, FL, and DA Frincke. (2010). "Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation." In: CW Probst, J Hunter, D Gollmann & M Bishop (Eds.), Insider Threats in Cyber Security, New York: Springer, pp. 85-113. Download
Greitzer, FL, AP Moore, DM Cappelli, DH Andrews, L Carroll, and TD Hull. (2008). "Combating the Insider Cyber Threat." IEEE Security & Privacy, 6(1): 61-64. Download
Copyright © 2018 PsyberAnalytix LLC - All Rights Reserved.
Powered by GoDaddy