Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
KSU Proceedings on Cybersecurity Education, Research and Practice
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.
Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman
Brain Betrayal: A Neuropsychological Categorization Of Insider Attacks, Rachel L. Whitman
KSU Proceedings on Cybersecurity Education, Research and Practice
Thanks to an abundance of highly publicized data breaches, Information Security (InfoSec) is taking a larger place in organizational priorities. Despite the increased attention, the threat posed to employers by their own employees remains a frightening prospect studied mostly in a technical light. This paper presents a categorization of insider deviant behavior and misbehavior based off of the neuropsychological foundations of three main types of insiders posing a threat to an organization: accidental attackers; neurologically “hot” malcontents, and neurologically “cold” opportunists.