Skip to Main Content
Bellevue University
LibGuides
Library
Threat Assessment and Management
Week 5
Search this Guide
Search
Threat Assessment and Management: Week 5
Home
TAM 510
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 520
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 530
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 540
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 610
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 620
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 630
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 690
Toggle Dropdown
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
TAM 620 Week 5 Websites
5 best ways to evaluate your organization’s security posture
(2023).
5 tips to evaluate network security skills
by
Testlify
(2024).
8 ways to improve your security posture and how to assess it
by
Fitzgerald, A.
(2025).
11 real-life insider threat examples
by
Simpson, A.
(2025).
Behavioral threat assessment and management
by
U.S. Dept of Homeland Security
Best ways to evaluate your security posture
by
Chahal, A.
(2024).
Conducting a successful security risk assessment
by
HCP
(2025).
How to reduce human risk: Best practices for security teams
by
HoxHunt
(2024).
Proofpoint – Human risk management
Security assessments explained: Types, benefits, and best practices
by
Global Guardian
Global Guardian (2025).
The role of professional product reviewers in evaluating security and privacy
by
Wentao, G., Walter, J., & Mazurek, M.
University of Maryland.
TAM 620 Week 5 Videos
Security risk assessment: Quick guide in 6 points.
LibGuide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
TAM 620 Week 5
Big Data Analytics with Applications in Insider Threat Detection
by
Thuraisingham, B., Parveen, P., Masud, M. & Khan, L.
ISBN: 9781351645768
(2017).
Insider Threat: Prevention, detection, mitigation and deterrence
by
Gelles, M.
ISBN: 9780128026229
Elsevier Science & Technology (2016).
The Insider Threat
by
Thompson, E.
ISBN: 9781498747080
CRC Press (2019).
Insider Threat: Combatting the enemy within
by
Blackwell, C
ISBN: 9781849280112
IT Governance Ltd. (2009).
Insider Threat: A guide to understanding, detecting, and defending against the enemy within.
by
Mehan, J.
ISBN: 9781849288415
IT Governance Publishing (2016).
Managing the Insider Threat
by
Catrantzos, N.
ISBN: 9781466566569
(2012).
Security Awareness for Dummies
by
Winkler, I.
ISBN: 9781119720935
Publication Date: 2022-03-24
TAM 620 Week 5 Journal Articles
Changing organizational attitudes: How economic considerations, hybrid teams and positive social engineering enhance insider threat programs.
by
VanBaaren, J.
ProQuest Dissertations & Theses (2016).
An approach to effectively identify insider attacks within an organization.
by
Doss, G.
Nova Southeastern University ProQuest Dissertations & Theses, (2012).
Design and analysis of knowledge-base centric insider threat models
by
Althebyan, Q.
Dissertation: Available from ProQuest One Academic. (304688018)(2008).
Detecting potential insider threat: Analyzing insiders’ sentiment exposed in social media
by
Park, W., You, Y., and Lee, K.
Security and Communication Networks (2018).
Early detection of cyber security threats using structured behavior modeling.
by
Yan, X. & Zhang, J.
Exploring the impact of organizational influences on insider threat behaviors: A convergent parallel mixed methods study.
by
Huertas-Baker, C.
ProQuest One Academic Dissertations (2022).
Minimizing insider threat risk with behavioral monitoring.
by
Elifoglu, I., Abel, I., & Tasseven, O.
Interdisciplinary Journal on Risk and Society.
Optimising insider threat prediction: Exploring BiLSTM networks and sequential features.
by
Manharan, P., Hong, W., Yin, J., Wang, H., Zhang, Y., & Ye, W.
Data Science & Engineering, (2024). Vol. 9, pgs. 393-408.
Statistical models for prediction threat detection from human behavior
by
Kelley T, Amon MJ, Bertenthal, BI.
Frontiers in Psychology (2018) 9:466.
Survival analysis for insider threat
by
Allhajjar, E., & Taylor, B.
Computational and Mathematical Organization Theory, (2022). Vol. 28(4), 335-351.
<<
Previous:
Week 4
Next:
Week 6 >>