Skip to Main Content
Bellevue University
LibGuides
Library
Threat Assessment and Management
Week 4
Search this Guide
Search
Threat Assessment and Management: Week 4
Home
TAM 510
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 520
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 530
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 540
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 610
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 620
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 630
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 690
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 620 Week 4 Websites
5 best ways to evaluate your organization’s security posture
(2023).
8 ways to improve your security posture and how to assess it
by
Fitzgerald, A.
(2025).
11 real-life insider threat examples
by
Simpson, A.
(2025).
Behavioral threat assessment and management
by
U.S. Dept of Homeland Security
Best ways to evaluate your security posture
by
Chahal, A.
(2024).
Conducting a successful security risk assessment
by
HCP
(2025).
Security assessments explained: Types, benefits, and best practices
by
Global Guardian
Global Guardian (2025).
Threat assessment and management teams
by
Department of Homeland Security
Understanding threat and risk assessment: A quick guide
by
Threat intelligence
(2024).
TAM 620 Week 4 Videos
Security risk assessment: Quick guide in 6 points.
LibGuide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
TAM 620 Week 4
Big Data Analytics with Applications in Insider Threat Detection
by
Thuraisingham, B., Parveen, P., Masud, M. & Khan, L.
ISBN: 9781351645768
(2017).
Insider Threat: Prevention, detection, mitigation and deterrence
by
Gelles, M.
ISBN: 9780128026229
Elsevier Science & Technology (2016).
Insider Threat: A guide to understanding, detecting, and defending against the enemy within.
by
Mehan, J.
ISBN: 9781849288415
IT Governance Publishing (2016).
The Insider Threat
by
Thompson, E.
ISBN: 9781498747080
CRC Press (2019).
Managing the Insider Threat
by
Catrantzos, N.
ISBN: 9781466566569
(2012).
Security Awareness for Dummies
by
Winkler, I.
ISBN: 9781119720935
Publication Date: 2022-03-24
TAM 620 Week 4 Journal Articles
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
by
VanBaaren, J.
ProQuest Dissertations & Theses (2016).
An approach to effectively identify insider attacks within an organization.
by
Doss, G.
Nova Southeastern University ProQuest Dissertations & Theses, (2012).
Design and analysis of knowledge-base centric insider threat models
by
Althebyan, Q.
Dissertation: Available from ProQuest One Academic. (304688018)(2008).
Detecting potential insider threat: Analyzing insiders’ sentiment exposed in social media
by
Park, W., You, Y., and Lee, K.
Security and Communication Networks (2018).
DTITD: An intelligent insider threat detection framework based ondigital twin and self-attention based deep learning models.
by
Wang, Z., & Saddik, A.
(2023).
Exploring the impact of organizational influences on insider threat behaviors: A convergent parallel mixed methods study.
by
Huertas-Baker, C.
ProQuest One Academic Dissertations (2022).
Factors influencing information security professionals' intentions to comply with ethical codes: A variance-based study.
by
Rader, M.
ProQuest One Academic Dissertation (2020).
A method for insider threat assessment by modeling the internal employee interactions.
by
Sepehrzadeh, H.
International Journal of Information Security (2023) 22:1385–1393
Statistical models for prediction threat detection from human behavior
by
Kelley T, Amon MJ, Bertenthal, BI.
Frontiers in Psychology (2018) 9:466.
Survival analysis for insider threat
by
Allhajjar, E., & Taylor, B.
Computational and Mathematical Organization Theory, (2022). Vol. 28(4), 335-351.
<<
Previous:
Week 3
Next:
Week 5 >>