Vetter, 2022
| Publication | Publication Date | Title |
|---|---|---|
| Cappelli et al. | The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud) | |
| Gelles | Insider threat: Prevention, detection, mitigation, and deterrence | |
| Kowalski et al. | Insider threat study: Illicit cyber activity in the information technology and telecommunications sector | |
| Hills et al. | A human factors contribution to countering insider threats: Practical prospects from a novel approach to warning and avoiding | |
| Lohrke et al. | Cybersecurity research from a management perspective: A systematic literature review and future research agenda | |
| Onwujekwe et al. | Using robust data governance to mitigate the impact of cybercrime | |
| Beebe et al. | Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process | |
| Dada et al. | Information security awareness, a tool to mitigate information security risk: A literature review | |
| Connolly et al. | Employee security behaviour: the importance of education and policies in organisational settings | |
| Workman et al. | Information security for managers | |
| Al-Harthy et al. | Dimensions of protection behaviors: a systematic literature review | |
| Vetter | Assessing Insider Threat Intentions: A Multiple Case Study Using Protection Motivation Theory | |
| Bush | Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization | |
| Ngufor | Understanding the perspectives of information security managers on insider threat: A phenomenology investigation | |
| Spicer | Cybercriminal profiling | |
| Bhattacharya | Leadership styles and information security in small businesses: An empirical investigation | |
| Maimon | Relevance of evidence-based cybersecurity in guiding the financial sector’s and efforts in fighting cybercrime | |
| Gundu | Towards an information security awareness process for engineering SMEs in emerging economies | |
| Green | Employees breaking bad with technology: An exploratory analysis of human factors that drive cyberspace insider threats | |
| Stephens | Understanding security compliant behavior: A case study | |
| Smith | Strategies to Reduce the Fiscal Impact of Cyberattacks | |
| Khan | A human centric approach to unintentional insider threat: development of a sociotechnical framework | |
| Cavusoglu | The economics of information technology security | |
| Murthy | Organizational Policies to Control Cybersecurity Breaches by Employees: A Participative Action Research | |
| Rawindaran et al. | Detection and Minimization of Malware by Implementing AI in SMEs |