@incollection{, FDE3939176C7D19B99FBCF8072A3CFCF , author={{SuchinthiFernando} and {TakashiYukawa} and {Nagaoka University of Technology}}, journal={{Global Journal of Human Social Sciences}}, journal={{GJHSS}}2249-460X0975-587X10.34257/GJHSS, address={Cambridge, United States}, publisher={Global Journals Organisation}141112 } @book{b0, , title={{Information security and business activities}} , author={{ TAsai }} , year={2007} , publisher={Kameda Book Service} , address={Niigata, Japan} } @book{b1, , title={{Protecting business information}} , author={{ JASchweitzer }} , year={1996} , publisher={Butterworth-Heinemann} , address={Newton, MA} } @book{b2, , title={{Human error at the centre of IT security breaches}} , author={{ MBean }} , year={2008. 2008} , note={Accessed 10 th February} } @book{b3, , title={{) the psychology of security}} , author={{ BSchneier }} , year={2008} , note={Online} } @incollection{b4, , title={{2011) do it differently}} , author={{ BRWilliams }} , journal={{Journal of Information Systems Security Association}} 9 5 6 } @book{b5, , title={{Securing against insider attacks. Information Security and Risk Management}} , author={{ DMLynch }} , year={2006} } @incollection{b6, , title={{) a comparison of system call feature representations for insider threat detection}} , author={{ ALiu }} , booktitle={{Proceedings of the 2005 IEEE Workshop on Information Assurance}} the 2005 IEEE Workshop on Information AssuranceUnited States Military Academy, West Point, NY , year={2005} } @incollection{b7, , title={{A scenario-based approach to mitigating the insider threat}} , author={{ RFMills }} , journal={{Information Systems Security Association Journal}} 9 5 , year={2011} } @incollection{b8, , title={{Information Security: Auditing the behaviour of the employee}} , author={{ CVroom } and { RVon Solms }} , booktitle={{IFIP TC11 18 th International Conference on Information Security (SEC2003)}} Athens, Greece; Norwell, MA , publisher={Kluwer Academic Publishers} , year={2003} , note={Gritzalis, D. et al. Security and Privacy in the Age of Uncertainty} } @incollection{b9, , title={{Have you seen the latest and greatest "security game changer}} , author={{ RVSabett }} , journal={{Journal of Information Systems Security Association}} 9 5 5 , year={2011} } @book{b10, , title={{Information security policies, procedures and standards: guidelines for effective information security management}} , author={{ TRPeltier }} , year={2002} , publisher={Auerback Publications} , address={Boca Raton, FL} } @incollection{b11, , title={{2002) a framework for human factors in information security}} , author={{ JJGonzalez } and { ASawicka }} , booktitle={{Proceedings of 2002 World Scientific and Engineering Academic Society International Conference on Information Security}} 2002 World Scientific and Engineering Academic Society International Conference on Information SecurityRio de Janeiro } @incollection{b12, , title={{Maintaining a proactive and sustainable security programme while hosting and processing personally identifiable information}} , author={{ KFoley }} , journal={{Information Systems Security Association Journal}} 9 5 , year={2011} } @incollection{b13, , title={{Internal control of secure information and communication practices through detection of user behavioural patterns}} , author={{ SAFernando } and { TYukawa }} , booktitle={{Proceedings of the World Congress on Engineering}} , booktitle={{Lecture Notes in Engineering and Computer Science}} the World Congress on EngineeringLondon , year={2013. 2013. July 2013} } @book{b14, , title={{Managing the human factor in information security: how to win over staff and influence business}} , author={{ DLacey }} , year={2009} , publisher={Wiley} , address={West Sussex, England} } @book{b15, , title={{Profiling pros and cons: an evaluation of contemporary criminal profiling methodologies. Final report -Honours Programme}} , author={{ TMYoung } and { SVarano }} , year={2006} , address={Boston, MA} Northeastern University } @book{b16, , title={{Available from: Emp0001 ?SF? Cannot determine personality Emp0002 IN?P Cannot determine personality Emp0003 ISFP Friendly, sensitive, likes own space and own time, loyal, committed, dislikes conflicts, enjoys present moment. Emp0004 INTP Seeks explanations, theoretical, not sociable, focused, analytical. Emp0005 ESFP Outgoing, friendly, accepting, loves material comforts, sociable, realistic, spontaneous. Emp0006 INTJ Develops perspectives, achieves goals, sceptical, has high performance standards. Emp0007 ESFP Outgoing, friendly, accepting, loves material comforts, sociable, realistic, spontaneous. Emp0008 ?SFP Cannot determine personality Emp0009 I??}} , author={{ MThompson }} , year={2011} , note={P Cannot determine personality Emp0010 INTP Seeks explanations, theoretical, sociable, focused, analytical} }