Insider threats have been discussed in this review based on two selected articles adopting the SWOT analysis. It outlines the advantages and disadvantages of the existing approaches and technologies used in the detection, gaps in resources, funding, and organization, opportunities to advance cooperation and development of new methods and strategies, and risks in the extrapolation of tactics and compliance issues. The information presented focuses on the prevention and control of insiders and the major strategies proposed, stressing the use of technological, behavioral, and organizational measures. Further studies should focus on the use of analytics, communication with stakeholders, and adjustments in security management to improve an organization's protection against insider threats.
Robert F. MillsGilbert L. PetersonMichael R. Grimaila
Vlad-Mihai CotenescuSergiu EftimieJ HunkerC ProbstC ColwillE ShawH Stock
Ronald DodgeAaron FergusonDawn M. Cappelli