Skip to main content
Top

Information Systems Frontiers

Issue 1/2013

Special Section on Security Management and Technologies for Protecting Against Internal Data Leakages

Content (11 Articles)

Guest editorial: A brief overview of data leakage and insider threats

Carly L. Huth, David W. Chadwick, William R. Claycomb, Ilsun You

Understanding insiders: An analysis of risk-taking behavior

Fariborz Farahmand, Eugene H. Spafford

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen

Application of density-based outlier detection to database activity monitoring

Seung Kim, Nam Wook Cho, Young Joo Lee, Suk-Ho Kang, Taewan Kim, Hyeseon Hwang, Dongseop Mun

Comment on Lee et al.’s group signature and e-auction scheme

Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang

Premium Partner