Verified Document

Theoretical Perspective It Is A Dissertation

Once this has been done in a thorough and global manner, comparative studies can be conducted in order to assess any similarities among the historical threats to determine measures to take against potential future threats. Capelli and Moore (2011, p. 25) go a step further in suggesting that targeted research, not only on language, but on the security environment in general, will greatly assist in both predicting and preventing insider threats in the online world. The organization CERT (Computer Emergency Response Team), for example, is part of the Software Engineering Institute (SEI) at Carnegie Mellon University. The Team has investigated the problems and concerns surrounding insider cloud computing threats since 2001. During this investigation, a database of more than 300 criminal cases have been compiled where persons with online access to company information, such as former employees, contractors, or business partners have abused the access and trust placed upon them. Databases like these can assist in determining the common factors in the economic, psychological, financial, and technological backgrounds of the individuals found guilty of such crimes.

CERT,...

With the use of system dynamics techniques, these models can be used to determine the potential of future threats in order to prevent them.
In conclusion, cloud computing threats are a vital area of study in order to assess current threats and prevent future ones.

References

Cappelli, D. And Moore, a.P. (2011, Spring). Insider Threat Center at GERT Grows Solutions from Reality-Based Research. IAnewsletter, Vol. 13, No. 2. Retrieved from: http://iac.dtic.mil/iatac/download/Vol13_No2.pdf

Ho, S.M. And Lee, H. (n.d.) Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-6.pdf

Hori, Y., Claycomb, W., and Yim, K. (n.d.) Frontiers in Insider Threats and Data Leakage Prevention. Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-0.pdf

Sources used in this document:
References

Cappelli, D. And Moore, a.P. (2011, Spring). Insider Threat Center at GERT Grows Solutions from Reality-Based Research. IAnewsletter, Vol. 13, No. 2. Retrieved from: http://iac.dtic.mil/iatac/download/Vol13_No2.pdf

Ho, S.M. And Lee, H. (n.d.) Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-6.pdf

Hori, Y., Claycomb, W., and Yim, K. (n.d.) Frontiers in Insider Threats and Data Leakage Prevention. Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-0.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Theoretical Perspective of the Biological Approach to Personality...
Words: 3177 Length: 11 Document Type: Term Paper

Theoretical Perspective of the Biological Approach to Personality Psychology Personality is defined as a person's exceptional deviation on the general evolutionary design for human temperament. A personality trait refers to a durable disposition to act in a certain manner in different situations. Personality traits represent some of the most significant sets of individual disparities in organizations. It is the comparatively set of psychological characteristics that differentiates one person from another. People

Theoretical Perspective and Counseling
Words: 743 Length: 2 Document Type: Case Study

Change Transtheoretical Model of Change "Process your thoughts about the stages of change and the processes associated with each stage. How might this information impact your work with clients? How might this information assist you with treatment planning? Do you think it is usual with all clients or only particular populations? " One thing that immediately stood out in the article, was the assumption that all major counseling theories may be viewed

Personality Theoretical Perspective of the Approach According
Words: 870 Length: 3 Document Type: Essay

Personality Theoretical perspective of the approach According to behavioral approach human behavior can be learned and unlearned. When a behavior is unlearned, new behaviors are learned in its place. This approach is primarily concerned with observable and measurable aspects of human behavior. Unacceptable behaviors are unlearned. This approach views development as a continuous process in which children play a positive role. This approach can be used in a clinical and educational

Constructive Therapy Constructivism Is a Theoretical Perspective
Words: 3489 Length: 10 Document Type: Essay

Constructive Therapy Constructivism is a theoretical perspective that asserts that people attempt to make sense of the world by developing their own set of personal individualized constructs. Personal experience, interpretation, social context, and linguistic factors define a person's subjective reality. Constructive psychotherapy focuses on individual experience, personal resilience, change, and the therapeutic relationship to assist people with change. The current article asserts that constructivism and constructive psychotherapies heavily draw from principles

Theoretical Applications on Why Bill
Words: 1905 Length: 6 Document Type: Term Paper

Therefore Clinton can be said to have generally followed a realist foreign policy program in Kosovo, yet due to changes in the international system which made it problematic to cut too many deals with dictators and war-criminals like Milosevich, a more conflictive approach to the issue was created. National interest, while predominant, was no longer the only consideration. One of the problems with a constructivist understanding of the war though,

Theoretical Approach to Generational Poverty
Words: 3947 Length: 12 Document Type: Term Paper

Theoretical Approach to Generational Poverty Poverty is one of the most pressing social problems and the generational nature of poverty remains one of the reasons it is so difficult to eradicate poverty. While there are several different theories suggesting why poverty is transmitted from generation to generation and theorists sometimes strongly disagree on those reasons, there is almost universal acceptance of the idea that poverty is transmitted from one generation to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now