Analysis of unintentional insider threats deriving from social engineering exploits

This paper reports on the researchers’ efforts to collect and analyse data from unintentional insider threats, noting how difficult data collection and analysis is in this area. Researchers note overcoming data collection and analysis issues is and will be necessary when developing security recommendations.