Confronting Information Security's Elephant, the Unintentional Insider Threat.
Matthew CanhamClay PoseyPatricia S. BockelmanPublished in: HCI (17) (2020)
Keyphrases
- information security
- insider threat
- critical infrastructure
- intrusion detection
- security architecture
- information systems
- smart card
- security issues
- network security
- information security management
- smart grid
- security requirements
- risk analysis
- e government
- sensitive data
- risk assessment
- data sets
- data streams
- intrusion detection system
- anomaly detection
- data collection
- decision support system
- distributed systems
- database systems
- data mining
- databases
- real time