These are the sources and citations used to research Steve Dissertation. This bibliography was generated on Cite This For Me on
In-text: (Legg et al., 2017)
Your Bibliography: Legg, P., Buckley, O., Goldsmith, M. and Creese, S. (2017). Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Systems Journal, 11(2), pp.503-512.
In-text: (Sarkar et al., 2017)
Your Bibliography: Sarkar, A., Kohler, S., Ludascher, B. and Bishop, M. (2017). Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Systems Journal, 11(2), pp.522-533.
In-text: (Ivanova et al., 2013)
Your Bibliography: Ivanova, M., Probst, C., Hansen, R. and Kammuller, F. (2013). Externalising Behaviour for Analysing System Models. Journal of Internet Services and Information Security (JISIS), [online] 3(3/4)(3). Available at: https://research.utwente.nl/en/publications/externalizing-behaviour-for-analysing-system-models [Accessed 12 Dec. 2017].
In-text: (Stavrou et al., 2014)
Your Bibliography: Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D. (2014). Business Process Modeling for Insider Threat Monitoring and Handling. 11th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2014. [online] Available at: https://www.scopus.com/record/display.uri?eid=2-s2.0-84906777219&origin=inward&txGid=c2ed7818c458e82cf6179e5e403ac4e5 [Accessed 1 Jan. 2018].
In-text: (Dark Reading, 2018)
Your Bibliography: Dark Reading. (2018). NSA Leak Ushers In New Era Of The Insider Threat. [online] Available at: http://www.darkreading.com/attacks-breaches/nsa-leak-ushers-in-new-era-of-the-insider-threat/d/d-id/1139941? [Accessed 12 Feb. 2018].
In-text: (Chafkin and Bergen, 2018)
Your Bibliography: Chafkin, M. and Bergen, M. (2018). Did Uber Steal the Driverless Future From Google?. [online] Bloomberg.com. Available at: https://www.bloomberg.com/news/features/2017-03-16/fury-road-did-uber-steal-the-driverless-future-from-google [Accessed 12 Feb. 2018].
In-text: (Official secrets. [H.L.] A bill intituled an act to re-enact the Official Secrets Act, 1889, with amendments, 2007)
Your Bibliography: Official secrets. [H.L.] A bill intituled an act to re-enact the Official Secrets Act, 1889, with amendments. (2007). Cambridge [England]: Proquest LLC.
In-text: (Google.co.uk, 2018)
Your Bibliography: Google.co.uk. (2018). the official secrets act 1888 - Google Search. [online] Available at: https://www.google.co.uk/search?rlz=1C1GGRV_enGB751GB751&ei=uLuBWq3RJtGckgWkpqroDQ&q=the+official+secrets+act+1888&oq=the+official+secrets+act+1888&gs_l=psy-ab.3...13366.14676.0.15946.5.5.0.0.0.0.87.354.5.5.0..2..0...1c.1.64.psy-ab..0.4.266...0j0i22i30k1j33i22i29i30k1.0.ZIHSemfj-V0 [Accessed 12 Feb. 2018].
In-text: (The Official Secrets Acts and Official Secrecy)
Your Bibliography: The Official Secrets Acts and Official Secrecy.BRIEFING PAPER Number CBP07422 2 May 2017.
In-text: (Vincent, 1998)
Your Bibliography: Vincent, D. (1998). The culture of secrecy. Oxford: Oxford University Press.
In-text: (Collinsdictionary.com, 2018)
Your Bibliography: Collinsdictionary.com. (2018). Vetting definition and meaning | Collins English Dictionary. [online] Available at: https://www.collinsdictionary.com/dictionary/english/vetting [Accessed 21 Feb. 2018].
In-text: (Lewis, 2018)
Your Bibliography: Lewis, P. (2018). Bradley Manning given 35-year prison term for passing files to WikiLeaks. [online] the Guardian. Available at: https://www.theguardian.com/world/2013/aug/21/bradley-manning-35-years-prison-wikileaks-sentence [Accessed 21 Feb. 2018].
In-text: (the Guardian, 2018)
Your Bibliography: the Guardian. (2018). Lord Haw-Haw hanged: archive, 4 January 1946. [online] Available at: https://www.theguardian.com/world/2016/jan/04/lord-haw-haw-executed-william-joyce-1946 [Accessed 21 Feb. 2018].
In-text: (Everett, Maer and Bartlett, 2018)
Your Bibliography: Everett, M., Maer, L. and Bartlett, G. (2018). The Official Secrets Acts and Official Secrecy. [online] Researchbriefings.parliament.uk. Available at: http://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-7422 [Accessed 21 Feb. 2018].
In-text: (Gov.uk, 2018)
Your Bibliography: Gov.uk. (2018). Security policy framework, April 2014 - GOV.UK. [online] Available at: https://www.gov.uk/government/publications/security-policy-framework/hmg-security-policy-framework [Accessed 21 Feb. 2018].
In-text: (Conti and Raymond, 2017)
Your Bibliography: Conti, g. and Raymond, D. (2017). On Cyber: Towards an operational art for cyber conflict. Kopidioan Press.
In-text: (Colwill, 2009)
Your Bibliography: Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days?. Information Security Technical Report, 14(4), pp.186-196.
In-text: (Joskowicz-Jabloner and Leiser, 2013)
Your Bibliography: Joskowicz-Jabloner, L. and Leiser, D. (2013). Varieties of trust-betrayal: emotion and relief patterns in different domains. Journal of Applied Social Psychology, 43(9), pp.1799-1813.
In-text: (Catrantzos, 2009)
Your Bibliography: Catrantzos, N. (2009). No dark corners. Monterey, Calif.: Naval Postgraduate School.
In-text: (Colwill, 2009)
Your Bibliography: Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days?. Information Security Technical Report, 14(4), pp.186-196.
In-text: (Irwin, 2018)
Your Bibliography: Irwin, L. (2018). Data breaches cost UK organisations £2.48 million. [online] IT Governance Blog. Available at: https://www.itgovernance.co.uk/blog/data-breaches-cost-uk-organisations-2-48-million/ [Accessed 25 Feb. 2018].
In-text: (Irwin, 2018)
Your Bibliography: Irwin, L. (2018). Data breaches cost UK organisations £2.48 million. [online] IT Governance Blog. Available at: https://www.itgovernance.co.uk/blog/data-breaches-cost-uk-organisations-2-48-million/ [Accessed 25 Feb. 2018].
In-text: (Www-01.ibm.com, 2018)
Your Bibliography: Www-01.ibm.com. (2018). Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. [online] Available at: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN& [Accessed 25 Feb. 2018].
In-text: (Products et al., 2018)
Your Bibliography: Products, S., Accounts, M., trends, T. and job, O. (2018). 2017 DBIR: Understand Your Cybersecurity Threats. [online] Verizon Enterprise Solutions. Available at: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017 [Accessed 26 Feb. 2018].
In-text: (Urquhart, 2013)
Your Bibliography: Urquhart, C. (2013). Grounded Theory for Qualitative Research. London: Sage Publications Ltd.
In-text: (Igual et al., n.d.)
Your Bibliography: Igual, L., Seguí, S., Vitrià, J., Puertas, E., Radeva, P., Pujol, O., Escalera, S., Dantí, F. and Garrido, L. (n.d.). Introduction to Data Science.
In-text: (Gutierrez, 2015)
Your Bibliography: Gutierrez, D. (2015). Machine learning and data science. Basking Ridge (N.J.): Technics Publications.
In-text: (Finlay, 2014)
Your Bibliography: Finlay, S. (2014). Predictive Analytics, Data Mining and Big Data. London: Palgrave Macmillan UK.
In-text: (Cappelli, Moore and Trzeciak, 2012)
Your Bibliography: Cappelli, D., Moore, A. and Trzeciak, R. (2012). The CERT guide to insider threats. Upper Saddle River, NJ: Addison-Wesley.
In-text: (Glaser and Strauss, n.d.)
Your Bibliography: Glaser, B. and Strauss, A. (n.d.). Discovery of Grounded Theory.
In-text: (Dickens, 2018)
Your Bibliography: Dickens, N. (2018). Can behavioural analytics inform the continued vetting question to reduce the risk posed by the insider..
In-text: (Mahmood and Afzal, 2013)
Your Bibliography: Mahmood, D. and Afzal, U. (2013). Security Analytics: Big Data Analytics for Cybersecurity. National Conference on information assurance (NCIA), 2nd.
In-text: (Stone, 2015)
Your Bibliography: Stone, S. (2015). Data to Decisions for Cyberspace Operations. Military Cyber Affairs, 1(1).
In-text: (Bloodworth et al., 2018)
Your Bibliography: Bloodworth, J., Bloodworth, J., Wheeler, S., Raine, C., Burghart, A., Mulley, C., Read, P., Bostridge, M., Leith, S. and Leith, S. (2018). The Cambridge spy ring and the myth of an upper-class cover up | The Spectator. [online] The Spectator. Available at: https://www.spectator.co.uk/2018/02/the-cambridge-spy-ring-and-the-myth-of-an-upper-class-cover-up/ [Accessed 24 Mar. 2018].
In-text: (Mullins, n.d.)
Your Bibliography: Mullins, L. (n.d.). Management and organisational behaviour.
In-text: (Riley, 1982)
Your Bibliography: Riley, T. (1982). Consuming secrets: How official secrecy affects everyday life in Britain. Government Publications Review, 9(4), pp.363-364.
In-text: (Gov.uk, 2018)
Your Bibliography: Gov.uk. (2018). [online] Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/677553/HMG_Baseline_Personnel_Security_Standard.pdf [Accessed 26 Mar. 2018].
In-text: (Legislation.gov.uk, 2018)
Your Bibliography: Legislation.gov.uk. (2018). Regulation of Investigatory Powers Act 2000. [online] Available at: https://www.legislation.gov.uk/ukpga/2000/23/section/3 [Accessed 31 Mar. 2018].
In-text: (Cao, 2010)
Your Bibliography: Cao, L. (2010). In-depth behavior understanding and use: The behavior informatics approach. Information Sciences, 180(17), pp.3067-3085.
In-text: (Google.com, 2018)
Your Bibliography: Google.com. (2018). Google Analytics Solutions - Marketing Analytics & Measurement. [online] Available at: https://www.google.com/analytics/#?modal_active=none [Accessed 31 Mar. 2018].
In-text: (INSIDER THREAT DETECTION AND MITIGATION TECHNIQUES, 2017)
Your Bibliography: INSIDER THREAT DETECTION AND MITIGATION TECHNIQUES. (2017). Scientific Bulletin of Naval Academy.
In-text: (Mehan, n.d.)
Your Bibliography: Mehan, J. (n.d.). Insider threat.
In-text: (Windup, 2010)
Your Bibliography: Windup, S. (2010). The leaking vault - five years of data breaches. Digital Forensics Association.
In-text: (Kent, Liebrock and Neil, 2015)
Your Bibliography: Kent, A., Liebrock, L. and Neil, J. (2015). Authentication graphs: Analyzing user behavior within an enterprise network. Computers & Security, 48, pp.150-166.
In-text: (HMG_national_cyber_security_strategy_2016, 2016)
Your Bibliography: HMG_national_cyber_security_strategy_2016 (2016). .
In-text: (Conti and Raymond, n.d.)
Your Bibliography: Conti, G. and Raymond, D. (n.d.). On cyber.
In-text: (Edgar and Manz, n.d.)
Your Bibliography: Edgar, T. and Manz, D. (n.d.). Research Methods for Cyber Security.
In-text: (Kumar, 2011)
Your Bibliography: Kumar, E. (2011). Natural Language Processing. Bangalore: I.K.International Publishing House Pvt.Ltd.
In-text: (Layton and Watters, 2016)
Your Bibliography: Layton, R. and Watters, P. (2016). Algorithms for automating open source intelligence (OSINT).
In-text: (Vaughan-Nichols, 2018)
Your Bibliography: Vaughan-Nichols, S. (2018). Today's most popular operating systems | ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/todays-most-popular-operating-systems/ [Accessed 8 Apr. 2018].
In-text: (Alhajj and Rokne, 2014)
Your Bibliography: Alhajj, R. and Rokne, J. (2014). Encyclopedia of social network analysis and mining. New York, NY: Springer.
In-text: (Bakhshandeh et al., 2011)
Your Bibliography: Bakhshandeh, R., Samadi, M., Azimifar, Z. and Schaeffer, J. (2011). Degrees of Separation in Social Networks. Proceedings, The Fourth International Symposium on Combinatorial Search.
In-text: (LinkedIn, 2018)
Your Bibliography: LinkedIn. (2018). Karl Marx, Revolutionary - 2nd degree connection.. [online] Available at: http://www.linkedin.com/in/karl-marx-1a801629/ [Accessed 8 Apr. 2018].
In-text: (Pee and Kankanhalli, 2009)
Your Bibliography: Pee, L. and Kankanhalli, A. (2009). A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology. Journal of Information & Knowledge Management, 08(02), pp.79-99.
In-text: (Pee and Kankanhalli, 2009)
Your Bibliography: Pee, L. and Kankanhalli, A. (2009). A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology. Journal of Information & Knowledge Management, 08(02), pp.79-99.
In-text: (Gilbert and Karahalios, 2009)
Your Bibliography: Gilbert, E. and Karahalios, K. (2009). Predicting Tie Strength in Social Media. CIH Boston.
10,587 students joined last month!