Frank L. Greitzer

Orcid: 0000-0003-0687-1774

According to our database1, Frank L. Greitzer authored at least 30 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Dynamic Nature of Insider Threat Indicators.
SN Comput. Sci., 2022

2021
Experimental Investigation of Technical and Human Factors Related to Phishing Susceptibility.
ACM Trans. Soc. Comput., 2021

Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

2020
Experimental Investigation of Demographic Factors Related to Phishing Susceptibility.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on Inside the Insider Threat.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
SOFIT: Sociotechnical and Organizational Factors for Insider Threat.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2016
Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat Risk.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

2015
Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis.
Secur. Informatics, 2015

Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis.
Secur. Informatics, 2015

Effect of network infrastructure factors on information system risk judgments.
Comput. Secur., 2015

2014
Security informatics research challenges for mitigating cyber friendly fire.
Secur. Informatics, 2014

Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Methods and Metrics for Evaluating Analytic Insider Threat Tools.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Cyber friendly fire: Research challenges for security informatics.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Toward the Development of a Psycholinguistic-based Measure of Insider Threat Risk Focusing on Core Word Categories Used in Social Media.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
CHAMPION: Intelligent Hierarchical Reasoning Agents for Enhanced Decision Support.
Proceedings of the Sixth International Conference on Semantic Technologies for Intelligence, 2011

A predictive defense system for the smart grid.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation.
Proceedings of the Insider Threats in Cyber Security, 2010

A Risk Management Approach to the "Insider Threat".
Proceedings of the Insider Threats in Cyber Security, 2010

Naturalistic Decision Making for Power System Operators.
Int. J. Hum. Comput. Interact., 2010

An Advanced Decision-Support Tool for Electricity Infrastructure Operations.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
Managing Complex Network Operation with Predictive Analytics.
Proceedings of the Technosocial Predictive Analytics, 2009

2008
Combating the Insider Cyber Threat.
IEEE Secur. Priv., 2008

2007
Cognitive science implications for enhancing training effectiveness in a serious gaming context.
ACM J. Educ. Resour. Comput., 2007

Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction.
Int. J. Cogn. Informatics Nat. Intell., 2007

2005
Toward the development of cognitive task difficulty metrics to support intelligence analysis research.
Proceedings of the 4th IEEE International Conference on Cognitive Informatics (ICCI 2005), 2005


  Loading...