Connections the quarterly journal

Search form

  • Like Connections page on Facebook(link is external)
  • Follow us on Twitter(link is external)
  • Find connections on Instagram(link is external)
  • Connect with us on LinkedIN(link is external)
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Understanding Insider Threat: A Framework for Characterising Attacks

Publication Type:

Conference Proceedings

Authors:

Jason R.C. Nurse; Oliver Buckley; Philip A. Legg; Michael Goldsmith; Sadie Creese; Gordon R.T. Wright; Monica Whitty

Source:

2014 IEEE Security and Privacy Workshops, San Jose, CA, USA, p.214-228 (2014)
  • 4543 reads
  • Google Scholar(link is external)
  • RTF
  • EndNote XML

Active calls for articles

Empowering the Trans-Atlantic Defense Industrial Base

Deadline:
30.06.2025

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile(link is external)

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Georgiev, Venelin. "Profiling Human Roles in Cybercrime." Information & Security: An International Journal 43, no. 2 (2019): 145-160.
APA style: Nurse, J. R. C., Buckley O., Legg P. A., Goldsmith M., Creese S., Wright G. R. T., et al. (2014).  Understanding Insider Threat: A Framework for Characterising Attacks. 2014 IEEE Security and Privacy Workshops. 214-228.
Chicago style: Nurse, Jason R. C., Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, and Monica Whitty. Understanding Insider Threat: A Framework for Characterising Attacks In 2014 IEEE Security and Privacy Workshops. San Jose, CA, USA, 2014.
IEEE style: Nurse, J. R. C., O. Buckley, P. A. Legg, M. Goldsmith, S. Creese, G. R. T. Wright, and M. Whitty, "Understanding Insider Threat: A Framework for Characterising Attacks", 2014 IEEE Security and Privacy Workshops, San Jose, CA, USA, pp. 214-228, 2014.
  • Trending
  • Latest(active tab)
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (2,105)
  • Towards a New Role for the European Union in the South Caucasus? (1,742)
  • Hybrid Threats and Strategic Competition (1,567)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,428)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,406)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes(link is external), 2012-2025
This site was designed and is maintained by Procon Ltd.(link is external), Executive publisher of Connections: The Quarterly Journal