Abstract is missing.
- Aspects of Insider ThreatsChristian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop. 1-15 [doi]
- Combatting Insider ThreatsPeter G. Neumann. 17-44 [doi]
- Insider Threat and Information Security ManagementLizzie Coles-Kemp, Marianthi Theoharidou. 45-71 [doi]
- A State of the Art Survey of Fraud Detection TechnologyUlrich Flegel, Julien Vayssière, Gunter Bitz. 73-84 [doi]
- Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat MitigationFrank L. Greitzer, Deborah A. Frincke. 85-113 [doi]
- A Risk Management Approach to the "Insider Threat"Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen. 115-137 [doi]
- Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud DetectionUlrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann. 139-171 [doi]
- Towards an Access-Control Framework for Countering Insider ThreatsJason Crampton, Michael Huth. 173-195 [doi]
- Monitoring Technologies for Mitigating Insider ThreatsBrian M. Bowen, Malek Ben Salem, Angelos D. Keromytis, Salvatore J. Stolfo. 197-217 [doi]
- Insider Threat Specification as a Threat Mitigation TechniqueGeorge Magklaras, Steven Furnell. 219-244 [doi]