These are the sources and citations used to research Steve Dissertation. This bibliography was generated on Cite This For Me on

  • Book

    Alhajj, R. and Rokne, J.

    Encyclopedia of social network analysis and mining

    2014 - Springer - New York, NY

    In-text: (Alhajj and Rokne, 2014)

    Your Bibliography: Alhajj, R. and Rokne, J. (2014). Encyclopedia of social network analysis and mining. New York, NY: Springer.

  • Journal

    Bakhshandeh, R., Samadi, M., Azimifar, Z. and Schaeffer, J.

    Degrees of Separation in Social Networks

    2011 - Proceedings, The Fourth International Symposium on Combinatorial Search

    In-text: (Bakhshandeh et al., 2011)

    Your Bibliography: Bakhshandeh, R., Samadi, M., Azimifar, Z. and Schaeffer, J. (2011). Degrees of Separation in Social Networks. Proceedings, The Fourth International Symposium on Combinatorial Search.

  • Website

    Bloodworth, J., Bloodworth, J., Wheeler, S., Raine, C., Burghart, A., Mulley, C., Read, P., Bostridge, M., Leith, S. and Leith, S.

    The Cambridge spy ring and the myth of an upper-class cover up | The Spectator

    2018

    In-text: (Bloodworth et al., 2018)

    Your Bibliography: Bloodworth, J., Bloodworth, J., Wheeler, S., Raine, C., Burghart, A., Mulley, C., Read, P., Bostridge, M., Leith, S. and Leith, S. (2018). The Cambridge spy ring and the myth of an upper-class cover up | The Spectator. [online] The Spectator. Available at: https://www.spectator.co.uk/2018/02/the-cambridge-spy-ring-and-the-myth-of-an-upper-class-cover-up/ [Accessed 24 Mar. 2018].

  • Journal

    Cao, L.

    In-depth behavior understanding and use: The behavior informatics approach

    2010 - Information Sciences

    In-text: (Cao, 2010)

    Your Bibliography: Cao, L. (2010). In-depth behavior understanding and use: The behavior informatics approach. Information Sciences, 180(17), pp.3067-3085.

  • Book

    Cappelli, D., Moore, A. and Trzeciak, R.

    The CERT guide to insider threats

    2012 - Addison-Wesley - Upper Saddle River, NJ

    In-text: (Cappelli, Moore and Trzeciak, 2012)

    Your Bibliography: Cappelli, D., Moore, A. and Trzeciak, R. (2012). The CERT guide to insider threats. Upper Saddle River, NJ: Addison-Wesley.

  • Book

    Catrantzos, N.

    No dark corners

    2009 - Naval Postgraduate School - Monterey, Calif.

    In-text: (Catrantzos, 2009)

    Your Bibliography: Catrantzos, N. (2009). No dark corners. Monterey, Calif.: Naval Postgraduate School.

  • Website

    Chafkin, M. and Bergen, M.

    Did Uber Steal the Driverless Future From Google?

    2018

    In-text: (Chafkin and Bergen, 2018)

    Your Bibliography: Chafkin, M. and Bergen, M. (2018). Did Uber Steal the Driverless Future From Google?. [online] Bloomberg.com. Available at: https://www.bloomberg.com/news/features/2017-03-16/fury-road-did-uber-steal-the-driverless-future-from-google [Accessed 12 Feb. 2018].

  • Website

    Vetting definition and meaning | Collins English Dictionary

    2018

    In-text: (Collinsdictionary.com, 2018)

    Your Bibliography: Collinsdictionary.com. (2018). Vetting definition and meaning | Collins English Dictionary. [online] Available at: https://www.collinsdictionary.com/dictionary/english/vetting [Accessed 21 Feb. 2018].

  • Journal

    Colwill, C.

    Human factors in information security: The insider threat – Who can you trust these days?

    2009 - Information Security Technical Report

    In-text: (Colwill, 2009)

    Your Bibliography: Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days?. Information Security Technical Report, 14(4), pp.186-196.

  • Journal

    Colwill, C.

    Human factors in information security: The insider threat – Who can you trust these days?

    2009 - Information Security Technical Report

    In-text: (Colwill, 2009)

    Your Bibliography: Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days?. Information Security Technical Report, 14(4), pp.186-196.

  • Book

    Conti, G. and Raymond, D.

    On Cyber: Towards an operational art for cyber conflict

    2017 - Kopidioan Press

    In-text: (Conti and Raymond, 2017)

    Your Bibliography: Conti, g. and Raymond, D. (2017). On Cyber: Towards an operational art for cyber conflict. Kopidioan Press.

  • Book

    Conti, G. and Raymond, D.

    On cyber

    In-text: (Conti and Raymond, n.d.)

    Your Bibliography: Conti, G. and Raymond, D. (n.d.). On cyber.

  • Website

    NSA Leak Ushers In New Era Of The Insider Threat

    2018 - Kelly Jackson-Higgins

    In-text: (Dark Reading, 2018)

    Your Bibliography: Dark Reading. (2018). NSA Leak Ushers In New Era Of The Insider Threat. [online] Available at: http://www.darkreading.com/attacks-breaches/nsa-leak-ushers-in-new-era-of-the-insider-threat/d/d-id/1139941? [Accessed 12 Feb. 2018].

  • Interview

    Dickens, N.

    Can behavioural analytics inform the continued vetting question to reduce the risk posed by the insider.

    2018 - West Brompton London

    In-text: (Dickens, 2018)

    Your Bibliography: Dickens, N. (2018). Can behavioural analytics inform the continued vetting question to reduce the risk posed by the insider..

  • Book

    Edgar, T. W. and Manz, D. O.

    Research Methods for Cyber Security

    In-text: (Edgar and Manz, n.d.)

    Your Bibliography: Edgar, T. and Manz, D. (n.d.). Research Methods for Cyber Security.

  • Website

    Everett, M., Maer, L. and Bartlett, G.

    The Official Secrets Acts and Official Secrecy

    2018

    In-text: (Everett, Maer and Bartlett, 2018)

    Your Bibliography: Everett, M., Maer, L. and Bartlett, G. (2018). The Official Secrets Acts and Official Secrecy. [online] Researchbriefings.parliament.uk. Available at: http://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-7422 [Accessed 21 Feb. 2018].

  • Book

    Finlay, S.

    Predictive Analytics, Data Mining and Big Data

    2014 - Palgrave Macmillan UK - London

    In-text: (Finlay, 2014)

    Your Bibliography: Finlay, S. (2014). Predictive Analytics, Data Mining and Big Data. London: Palgrave Macmillan UK.

  • Journal

    Gilbert, E. and Karahalios, K.

    Predicting Tie Strength in Social Media

    2009 - CIH Boston

    In-text: (Gilbert and Karahalios, 2009)

    Your Bibliography: Gilbert, E. and Karahalios, K. (2009). Predicting Tie Strength in Social Media. CIH Boston.

  • Book

    Glaser, B. G. and Strauss, A. L.

    Discovery of Grounded Theory

    In-text: (Glaser and Strauss, n.d.)

    Your Bibliography: Glaser, B. and Strauss, A. (n.d.). Discovery of Grounded Theory.

  • Website

    the official secrets act 1888 - Google Search

    2018

    In-text: (Google.co.uk, 2018)

    Your Bibliography: Google.co.uk. (2018). the official secrets act 1888 - Google Search. [online] Available at: https://www.google.co.uk/search?rlz=1C1GGRV_enGB751GB751&ei=uLuBWq3RJtGckgWkpqroDQ&q=the+official+secrets+act+1888&oq=the+official+secrets+act+1888&gs_l=psy-ab.3...13366.14676.0.15946.5.5.0.0.0.0.87.354.5.5.0..2..0...1c.1.64.psy-ab..0.4.266...0j0i22i30k1j33i22i29i30k1.0.ZIHSemfj-V0 [Accessed 12 Feb. 2018].

  • Website

    Google Analytics Solutions - Marketing Analytics & Measurement

    2018

    In-text: (Google.com, 2018)

    Your Bibliography: Google.com. (2018). Google Analytics Solutions - Marketing Analytics & Measurement. [online] Available at: https://www.google.com/analytics/#?modal_active=none [Accessed 31 Mar. 2018].

  • Website

    Anon

    2018

    In-text: (Gov.uk, 2018)

    Your Bibliography: Gov.uk. (2018). [online] Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/677553/HMG_Baseline_Personnel_Security_Standard.pdf [Accessed 26 Mar. 2018].

  • Website

    Security policy framework, April 2014 - GOV.UK

    2018

    In-text: (Gov.uk, 2018)

    Your Bibliography: Gov.uk. (2018). Security policy framework, April 2014 - GOV.UK. [online] Available at: https://www.gov.uk/government/publications/security-policy-framework/hmg-security-policy-framework [Accessed 21 Feb. 2018].

  • Book

    Gutierrez, D. D.

    Machine learning and data science

    2015 - Technics Publications - Basking Ridge (N.J.)

    In-text: (Gutierrez, 2015)

    Your Bibliography: Gutierrez, D. (2015). Machine learning and data science. Basking Ridge (N.J.): Technics Publications.

  • Govt. publication

    HMG_national_cyber_security_strategy_2016

    2016

    In-text: (HMG_national_cyber_security_strategy_2016, 2016)

    Your Bibliography: HMG_national_cyber_security_strategy_2016 (2016). .

  • Book

    Igual, L., Seguí, S., Vitrià, J., Puertas, E., Radeva, P., Pujol, O., Escalera, S., Dantí, F. and Garrido, L.

    Introduction to Data Science

    In-text: (Igual et al., n.d.)

    Your Bibliography: Igual, L., Seguí, S., Vitrià, J., Puertas, E., Radeva, P., Pujol, O., Escalera, S., Dantí, F. and Garrido, L. (n.d.). Introduction to Data Science.

  • Journal

    INSIDER THREAT DETECTION AND MITIGATION TECHNIQUES

    2017 - Scientific Bulletin of Naval Academy

    In-text: (INSIDER THREAT DETECTION AND MITIGATION TECHNIQUES, 2017)

    Your Bibliography: INSIDER THREAT DETECTION AND MITIGATION TECHNIQUES. (2017). Scientific Bulletin of Naval Academy.

  • Website

    Irwin, L.

    Data breaches cost UK organisations £2.48 million

    2018

    In-text: (Irwin, 2018)

    Your Bibliography: Irwin, L. (2018). Data breaches cost UK organisations £2.48 million. [online] IT Governance Blog. Available at: https://www.itgovernance.co.uk/blog/data-breaches-cost-uk-organisations-2-48-million/ [Accessed 25 Feb. 2018].

  • Website

    Irwin, L.

    Data breaches cost UK organisations £2.48 million

    2018

    In-text: (Irwin, 2018)

    Your Bibliography: Irwin, L. (2018). Data breaches cost UK organisations £2.48 million. [online] IT Governance Blog. Available at: https://www.itgovernance.co.uk/blog/data-breaches-cost-uk-organisations-2-48-million/ [Accessed 25 Feb. 2018].

  • Journal

    Ivanova, M. G., Probst, C. W., Hansen, R. R. and Kammuller, F.

    Externalising Behaviour for Analysing System Models

    2013 - Journal of Internet Services and Information Security (JISIS)

    In-text: (Ivanova et al., 2013)

    Your Bibliography: Ivanova, M., Probst, C., Hansen, R. and Kammuller, F. (2013). Externalising Behaviour for Analysing System Models. Journal of Internet Services and Information Security (JISIS), [online] 3(3/4)(3). Available at: https://research.utwente.nl/en/publications/externalizing-behaviour-for-analysing-system-models [Accessed 12 Dec. 2017].

  • Journal

    Joskowicz-Jabloner, L. and Leiser, D.

    Varieties of trust-betrayal: emotion and relief patterns in different domains

    2013 - Journal of Applied Social Psychology

    In-text: (Joskowicz-Jabloner and Leiser, 2013)

    Your Bibliography: Joskowicz-Jabloner, L. and Leiser, D. (2013). Varieties of trust-betrayal: emotion and relief patterns in different domains. Journal of Applied Social Psychology, 43(9), pp.1799-1813.

  • Journal

    Kent, A. D., Liebrock, L. M. and Neil, J. C.

    Authentication graphs: Analyzing user behavior within an enterprise network

    2015 - Computers & Security

    In-text: (Kent, Liebrock and Neil, 2015)

    Your Bibliography: Kent, A., Liebrock, L. and Neil, J. (2015). Authentication graphs: Analyzing user behavior within an enterprise network. Computers & Security, 48, pp.150-166.

  • Book

    Kumar, E.

    Natural Language Processing

    2011 - I.K.International Publishing House Pvt.Ltd - Bangalore

    In-text: (Kumar, 2011)

    Your Bibliography: Kumar, E. (2011). Natural Language Processing. Bangalore: I.K.International Publishing House Pvt.Ltd.

  • Book

    Layton, R. and Watters, P. A.

    Algorithms for automating open source intelligence (OSINT)

    2016

    In-text: (Layton and Watters, 2016)

    Your Bibliography: Layton, R. and Watters, P. (2016). Algorithms for automating open source intelligence (OSINT).

  • Journal

    Legg, P. A., Buckley, O., Goldsmith, M. and Creese, S.

    Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

    2017 - IEEE Systems Journal

    In-text: (Legg et al., 2017)

    Your Bibliography: Legg, P., Buckley, O., Goldsmith, M. and Creese, S. (2017). Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Systems Journal, 11(2), pp.503-512.

  • Website

    Legislation.gov.uk

    2018

    In-text: (Legislation.gov.uk, 2018)

    Your Bibliography: Legislation.gov.uk. (2018). Legislation.gov.uk. [online] Available at: http://www.legislation.gov.uk/browse/uk [Accessed 21 Apr. 2018].

  • Website

    Regulation of Investigatory Powers Act 2000

    2018

    In-text: (Legislation.gov.uk, 2018)

    Your Bibliography: Legislation.gov.uk. (2018). Regulation of Investigatory Powers Act 2000. [online] Available at: https://www.legislation.gov.uk/ukpga/2000/23/section/3 [Accessed 31 Mar. 2018].

  • Website

    Lewis, P.

    Bradley Manning given 35-year prison term for passing files to WikiLeaks

    2018

    In-text: (Lewis, 2018)

    Your Bibliography: Lewis, P. (2018). Bradley Manning given 35-year prison term for passing files to WikiLeaks. [online] the Guardian. Available at: https://www.theguardian.com/world/2013/aug/21/bradley-manning-35-years-prison-wikileaks-sentence [Accessed 21 Feb. 2018].

  • Website

    Karl Marx, Revolutionary - 2nd degree connection.

    2018 - LinkedIn

    In-text: (LinkedIn, 2018)

    Your Bibliography: LinkedIn. (2018). Karl Marx, Revolutionary - 2nd degree connection.. [online] Available at: http://www.linkedin.com/in/karl-marx-1a801629/ [Accessed 8 Apr. 2018].

  • Journal

    Mahmood, D. T. and Afzal, U.

    Security Analytics: Big Data Analytics for Cybersecurity

    2013 - National Conference on information assurance (NCIA)

    In-text: (Mahmood and Afzal, 2013)

    Your Bibliography: Mahmood, D. and Afzal, U. (2013). Security Analytics: Big Data Analytics for Cybersecurity. National Conference on information assurance (NCIA), 2nd.

  • Book

    Mehan, J. E.

    Insider threat

    In-text: (Mehan, n.d.)

    Your Bibliography: Mehan, J. (n.d.). Insider threat.

  • Book

    Mullins, L. J.

    Management and organisational behaviour

    In-text: (Mullins, n.d.)

    Your Bibliography: Mullins, L. (n.d.). Management and organisational behaviour.

  • Book

    Nairn, N.

    Nick Nairn's top 100 salmon recipes

    2003 - BBC - [London]

    In-text: (Nairn, 2003)

    Your Bibliography: Nairn, N. (2003). Nick Nairn's top 100 salmon recipes. [London]: BBC.

  • Book

    Official secrets. [H.L.] A bill intituled an act to re-enact the Official Secrets Act, 1889, with amendments

    2007 - Proquest LLC - Cambridge [England]

    In-text: (Official secrets. [H.L.] A bill intituled an act to re-enact the Official Secrets Act, 1889, with amendments, 2007)

    Your Bibliography: Official secrets. [H.L.] A bill intituled an act to re-enact the Official Secrets Act, 1889, with amendments. (2007). Cambridge [England]: Proquest LLC.

  • Journal

    Pee, L. G. and Kankanhalli, A.

    A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology

    2009 - Journal of Information & Knowledge Management

    In-text: (Pee and Kankanhalli, 2009)

    Your Bibliography: Pee, L. and Kankanhalli, A. (2009). A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology. Journal of Information & Knowledge Management, 08(02), pp.79-99.

  • Journal

    Pee, L. G. and Kankanhalli, A.

    A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology

    2009 - Journal of Information & Knowledge Management

    In-text: (Pee and Kankanhalli, 2009)

    Your Bibliography: Pee, L. and Kankanhalli, A. (2009). A Model of Organisational Knowledge Management Maturity Based on People, Process, and Technology. Journal of Information & Knowledge Management, 08(02), pp.79-99.

  • Website

    Products, S., Accounts, M., trends, T. and job, O.

    2017 DBIR: Understand Your Cybersecurity Threats

    2018

    In-text: (Products et al., 2018)

    Your Bibliography: Products, S., Accounts, M., trends, T. and job, O. (2018). 2017 DBIR: Understand Your Cybersecurity Threats. [online] Verizon Enterprise Solutions. Available at: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017 [Accessed 26 Feb. 2018].

  • Journal

    Rabiee, F.

    Focus-group interview and data analysis

    2004 - Proceedings of the Nutrition Society

    In-text: (Rabiee, 2004)

    Your Bibliography: Rabiee, F. (2004). Focus-group interview and data analysis. Proceedings of the Nutrition Society, 63(04), pp.655-660.

  • Journal

    Riley, T.

    Consuming secrets: How official secrecy affects everyday life in Britain

    1982 - Government Publications Review

    In-text: (Riley, 1982)

    Your Bibliography: Riley, T. (1982). Consuming secrets: How official secrecy affects everyday life in Britain. Government Publications Review, 9(4), pp.363-364.

  • Journal

    Ring, T. and Wilk, R.

    Behavioural analytics: sifting good users from bad actors

    2015 - Biometric Technology Today

    In-text: (Ring and Wilk, 2015)

    Your Bibliography: Ring, T. and Wilk, R. (2015). Behavioural analytics: sifting good users from bad actors. Biometric Technology Today, 2015(11), pp.8-11.

  • Journal

    Sarkar, A., Kohler, S., Ludascher, B. and Bishop, M.

    Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes

    2017 - IEEE Systems Journal

    In-text: (Sarkar et al., 2017)

    Your Bibliography: Sarkar, A., Kohler, S., Ludascher, B. and Bishop, M. (2017). Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Systems Journal, 11(2), pp.522-533.

  • Journal

    Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D.

    Business Process Modeling for Insider Threat Monitoring and Handling

    2014 - 11th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2014

    In-text: (Stavrou et al., 2014)

    Your Bibliography: Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D. (2014). Business Process Modeling for Insider Threat Monitoring and Handling. 11th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2014. [online] Available at: https://www.scopus.com/record/display.uri?eid=2-s2.0-84906777219&origin=inward&txGid=c2ed7818c458e82cf6179e5e403ac4e5 [Accessed 1 Jan. 2018].

  • Journal

    Stone, S.

    Data to Decisions for Cyberspace Operations

    2015 - Military Cyber Affairs

    In-text: (Stone, 2015)

    Your Bibliography: Stone, S. (2015). Data to Decisions for Cyberspace Operations. Military Cyber Affairs, 1(1).

  • Website

    Lord Haw-Haw hanged: archive, 4 January 1946

    2018

    In-text: (the Guardian, 2018)

    Your Bibliography: the Guardian. (2018). Lord Haw-Haw hanged: archive, 4 January 1946. [online] Available at: https://www.theguardian.com/world/2016/jan/04/lord-haw-haw-executed-william-joyce-1946 [Accessed 21 Feb. 2018].

  • Legislation

    The Official Secrets Acts and Official Secrecy

    2017 - House of Commons Library - UK

    In-text: (The Official Secrets Acts and Official Secrecy)

    Your Bibliography: The Official Secrets Acts and Official Secrecy.BRIEFING PAPER Number CBP07422 2 May 2017.

  • Book

    Urquhart, C.

    Grounded Theory for Qualitative Research

    2013 - Sage Publications Ltd - London

    In-text: (Urquhart, 2013)

    Your Bibliography: Urquhart, C. (2013). Grounded Theory for Qualitative Research. London: Sage Publications Ltd.

  • Website

    Vaughan-Nichols, S.

    Today's most popular operating systems | ZDNet

    2018

    In-text: (Vaughan-Nichols, 2018)

    Your Bibliography: Vaughan-Nichols, S. (2018). Today's most popular operating systems | ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/todays-most-popular-operating-systems/ [Accessed 8 Apr. 2018].

  • Book

    Vincent, D.

    The culture of secrecy

    1998 - Oxford University Press - Oxford

    In-text: (Vincent, 1998)

    Your Bibliography: Vincent, D. (1998). The culture of secrecy. Oxford: Oxford University Press.

  • Journal

    Windup, S.

    The leaking vault - five years of data breaches

    2010 - Digital Forensics Association

    In-text: (Windup, 2010)

    Your Bibliography: Windup, S. (2010). The leaking vault - five years of data breaches. Digital Forensics Association.

  • Website

    Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview

    2018

    In-text: (Www-01.ibm.com, 2018)

    Your Bibliography: Www-01.ibm.com. (2018). Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview. [online] Available at: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN& [Accessed 25 Feb. 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join