Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 62, 2020 - Issue 6
136
Views
0
CrossRef citations to date
0
Altmetric
Research Article

CORPORATE CYBERESPIONAGE: IDENTIFICATION AND PREVENTION PART 2

REFERENCES

  • Abd Jalil, J., & Hassan, H. (2020). Protecting trade secrets from theft and corporate espionage: Some legal and administrative measures. International Journal of Business and Society, 21(1), 205–218.
  • Akopyan, D. A., & Yelyakov, A. D. (2009, October). Cybercrimes in the information structure of society: A survey. Scientific and Technical Information Processing, 36(6), 338–350. https://doi.org/10.3103/S0147688209060057
  • Bressler, M. S., & Bressler, L. (2015). Protecting your company’s intellectual property assets from cyber-espionage. Journal of Legal, Ethical and Regulatory Issues, 18(1), 21–34.
  • Federation of American Science. (1995). Annual report to congress on foreign economic collection and industrial espionage. https://fas.org
  • Greitzer, F. L., & Hohimer, R. E. (2011). Modeling human behavior to anticipate insider attacks. Journal of Strategic Security, 4(2), 25–48. https://doi.org/10.5038/1944-0472.4.2.2
  • Heider, F. (1944). Social perception and phenomenal causality. Psychological Review, 51, 358–374.
  • Ho, S., Kaarst-Brown, M., & Benbasat, I. (2018). Trustworthiness attribution: Inquiry into insider threat detection. Journal of the Association for Information Science and Technology, 69(2), 271–280. https://doi.org/10.1002/asi.23938
  • Ho, S. M., & Benbasat, I. (2014). Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations. Journal of the Association for Information Science and Technology, 65, 1555–1576.
  • Ho, S. M., Hancock, J. T., & Booth, C. (2017). Ethical dilemma: Deception dynamics in computer-medicated group communication. Journal of the American Society for Information Science and Technology, 68, 2729–2742.
  • Ho, S. M., Hancock, J. T., Booth, C., & Liu, X. (2016). Computer-mediated deception: Revealed by language-action cues in spontaneous communication. Journal of Management Information Systems, 33, 393–420.
  • Ho, S. M., & Warkentin, M. (2017). Leader’s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19, 377–396.
  • Hubbard, T., Weber, G. L., & Steinhoff, J. C. (2017, Fall). Protecting data assets in a perilous cyber world. Journal of Government Financial Management, 26–31.
  • Iovan, S., & Iovan, A. A. (2016, December). From cyber threat to cyber-crime. Romanian Economic Business Review, Romanian-American University, 10(2), 425–434.
  • Jacobs, P., Solms, S. V., & Grobler, M. (2016). E-CMIRC: Towards a model for the integration of services between SOCs and CSIRTs, conference. 15th European Conference on Cyber Warfare and Security, Munich, Germany.
  • Kelley, H. H. (1973). The process of causal attribution. American Psychology, 28, 107–128.
  • Krasznay, C., & Hamornik, B. (2018). Analysis of cyberattack patterns by user behavior analytics. AARMS, 17(3), 101–114.
  • Krekel, B., Adams, P., & Bakos, G. (2012, March 7). Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. U.S.-China Economic and Security Review Commission (Northrop Grumman Corp).
  • Kumar, G., & Kumar, K. (2014). Network security – An updated perspective. Systems Science & Control Engineering: An Open Access Journal, 2(1), 325–334. https://doi.org/10.1080/21642583.2014.895969
  • Laska, A., Johnson, B., Schottle, P., Grossklags, J., & Bohme, R. (2014, October). Secure team composition to thwart insider threats and cyber-espionage. ACM Transactions on Internet Technology, 14(2–3), Art 19.
  • Maybury, M., Chase, P., Cheikes, B., Brackney, D., Matzner, S., Hetherington, T., Wood, B., Sibley, C., Marin, J., Longstaff, T., Spitzner, L., Copeland, J., & Lewandowski, S. (2005). Analysis and detection of malicious insiders. International Conference on Intelligence Analysis, McLean, VA.
  • Mazzarolo, G., & Jurcut, A. D. (2019, November). Insider threats in cybersecurity: The enemy within the gates. Analysis, 6(1), 57–63.
  • Merritt, D., & Mullins, B. (2011, January). Identifying cyber espionage: Towards a synthesis Approach. Proceedings of the International Conference on Information Warfare, 180.
  • National Counterintelligence and Security Center. (2018). Foreign economic espionage in cyberspace. Office of the Director of National Intelligence.
  • National Counterintelligence Center. (2000). Annual report to congress on foreign economic collection and industrial espionage.
  • O’Hara, G. (2010). Cyber-espionage: Growing threat to the American economy. CommLaw Conspectus: Journal of Communications Law and Policy, 19(1), 241–276.
  • Probst, C. W., Hunker, J., Bishop, M., & Gollmann, D. (2010). Review of insider threats in cyber security. ACM SIGACT News, (June 2012), 43(2), 38–40. https://doi.org/10.1145/2261417.2261428
  • Schwarz, N. (2015). Metacognition. In M. Mikulincer, P. R. Shaver, E. Borgida, & J. A. Bargh (Eds.), APA handbook of personality and social psychology: Attitudes and social cognition (Vol. 1, pp. 203–229). Washington, DC: American Psychological Association.
  • Smith, R. W., & Schwarz, N. (2016). Metacognitive inferences from other people’s memory performance. Journal of Experimental Psychology: Applied, 22, 285–294.
  • Torre, M., Dumay, J., & Rea, M. (2018). Breaching intellectual capital: Critical reflections on Big Data security. Meditari Accountancy Research, 26(3), 463–482. https://doi.org/10.1108/MEDAR-06-2017-0154
  • Wall, D. S. (2012). Enemies within: Redefining the insider threat in organizational security policy. Security Journal, 26, 107–124.
  • Wangen, G. (2015). The role of malware in reported cyber espionage: A review of the impact and mechanism. Information, 6(2), 183–211. https://doi.org/10.3390/info6020183
  • Winnefeld, J., Kirchhoff, C., & Upton, D. (2015). Cybersecurity’s human factor: Lessons from the pentagon. Harvard Business Review, September, 86–95.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.