Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Fujs, Damjan
Mihelič, Anže
and
Vrhovec, Simon L. R.
2019.
The power of interpretation.
p.
1.
Bedford, Justine
and
van der Laan, Luke
2021.
Operationalising a framework for organisational vulnerability to intentional insider threat: the OVIT as a valid and reliable diagnostic tool.
Journal of Risk Research,
Vol. 24,
Issue. 9,
p.
1180.
Rice, Charis
and
Searle, Rosalind H.
2022.
‘The Enabling Role of Internal Organizational Communication in Insider Threat Activity – Evidence From a High Security Organization’.
Management Communication Quarterly,
Vol. 36,
Issue. 3,
p.
467.
2023.
Cyber Threat Intelligence.
p.
31.
Whitty, Monica T.
Ruddy, Christopher
and
Keatley, David A.
2023.
Human Aspects of Information Security and Assurance.
Vol. 674,
Issue. ,
p.
377.
Whitty, Monica T.
2023.
Cybercrime in the Pandemic Digital Age and Beyond.
p.
57.
Marbut, A. R.
and
Harms, P. D.
2024.
Fiends and Fools: A Narrative Review and Neo-socioanalytic Perspective on Personality and Insider Threats.
Journal of Business and Psychology,
Vol. 39,
Issue. 3,
p.
679.
Whitelaw, Findlay
Riley, Jackie
and
Elmrabit, Nebrase
2024.
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services.
IEEE Access,
Vol. 12,
Issue. ,
p.
34752.
Taylor, Jacqui
and
Whitty, Monica
2024.
An Exploration of the Awareness and Attitudes of Psychology Students Regarding Their Psychological Literacy for Working in the Cybersecurity Industry.
Psychology Learning & Teaching,
Vol. 23,
Issue. 2,
p.
298.
Renaud, Karen
Warkentin, Merrill
Pogrebna, Ganna
and
van der Schyff, Karl
2024.
VISTA: An inclusive insider threat taxonomy, with mitigation strategies.
Information & Management,
Vol. 61,
Issue. 1,
p.
103877.
Liang, Nan
Biros, David P.
and
Luse, Andy
2024.
An Empirical Comparison of Malicious Insiders and Benign Insiders.
Journal of Computer Information Systems,
Vol. 64,
Issue. 6,
p.
762.
Vakulchik, O. V.
Mazepa, R. B.
and
Mikhaylov, V. Y.
2024.
Detection and Monitoring of Processes that Exploit the Cursor Mechanism, Provoking Locks in Information and Information Search Systems.
p.
1.
Whitty, Monica Therese
Ruddy, Christopher
Keatley, David
Butavicius, Marcus
and
Grobler, Marthie
2024.
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks.
Information & Computer Security,
Vol. 32,
Issue. 4,
p.
509.
Esparza, Esteban
Diéguez, Mauricio
and
Hochstetter, Jorge
2025.
Advanced Research in Technologies, Information, Innovation and Sustainability.
Vol. 2347,
Issue. ,
p.
378.
Holden, Heather
Munro, Victor
Tsakiris, Lina
and
Wilner, Alex
2025.
“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats.
Information Security Journal: A Global Perspective,
Vol. 34,
Issue. 1,
p.
63.
Phillips, Peter J.
and
Pohl, Gabriela
2025.
Industrial espionage: window of opportunity.
Information Security Journal: A Global Perspective,
Vol. 34,
Issue. 2,
p.
143.