The (ISC)2 US Government Advisory Board Executive Writers Bureau
{"title":"好的,坏的,和丑陋的内部威胁","authors":"The (ISC)2 US Government Advisory Board Executive Writers Bureau","doi":"10.1016/S1754-4548(11)70082-1","DOIUrl":null,"url":null,"abstract":"<div><p>Whether intentional or unintentional, insider threats take many forms. <strong>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 30-32"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70082-1","citationCount":"0","resultStr":"{\"title\":\"The Good, the Bad, and the Ugly Insider Threats\",\"authors\":\"The (ISC)2 US Government Advisory Board Executive Writers Bureau\",\"doi\":\"10.1016/S1754-4548(11)70082-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Whether intentional or unintentional, insider threats take many forms. <strong>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape</p></div>\",\"PeriodicalId\":100672,\"journal\":{\"name\":\"Infosecurity\",\"volume\":\"8 6\",\"pages\":\"Pages 30-32\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70082-1\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Infosecurity\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1754454811700821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infosecurity","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1754454811700821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Whether intentional or unintentional, insider threats take many forms. The (ISC)2 US Government Advisory Board Executive Writers Bureau examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape