Loading [Contrib]/a11y/accessibility-menu.js

Scholarship In Practice

The Design and Implementation of an Insider Threat Maturity Model
October 23, 2024 PDT
The Design and Implementation of an Insider Threat Maturity Model
Andrew StewartMark Handy

An insider threat maturity model, created by synthesizing recommendations from multiple best practice documents. The design of the model and its application at a large multinational investment bank are detailed.

Reducing Insider Risk Through Positive Deterrence
August 02, 2022 PDT
Reducing Insider Risk Through Positive Deterrence
Andrew P. MooreCarrie GardnerDenise M. Rousseau

Why and how insider risk management programs should consider a positive deterrence approach to promote the mutual interests of employees and their organization in ways that reduce insider risk.

Domestic Extremism: How to Counter Threats Posed to Critical Assets
August 02, 2022 PDT
Domestic Extremism: How to Counter Threats Posed to Critical Assets
Jessica BawejaMadelyn P. DunningChristine Noonan

This study on protecting critical assets against domestic extremism threats emphasizes the importance of appropriate prevention and response measures and early intervention for insiders potentially vulnerable to radicalization.

Seven (Science-Based) Commandments for Understanding and Countering Insider Threats
August 02, 2022 PDT
Seven (Science-Based) Commandments for Understanding and Countering Insider Threats
Eric L. Lang

Seven science-based “commandments” provide overarching human factors and social science insights and recommendations for understanding and countering insider threats.