Description:
[1] 2020 Insider Threat Report. Cybersecurity Insiders, URL: https://www.cybersecurityinsiders.com/wp-content/uploads/2019/11/2020-Insider-Threat-Report-Gurucul.pdf
[2] N. Kuharska, Informacijna bezpeka jak element korporatyvnoji struktury Aktualʹni problemy
upravlinnja informacijnoju bezpekoju deržavy: zb. tez nauk. dop. nauk.-prakt. konf. (Kyjiv, 4
kvitnja 2019. Kyjiv : Nac. akad. SBU) 70–73.
[3] A. A. Cain, M. E. Edwards, J. D. Still, An exploratory study of cyber hygiene behaviors and
knowledge. Journal of Information Security and Applications. Vol. 42 (2018) 36-45.
[4] S.Honchar, H. Leonenko, Analysis of the factors influencing condition cybersecurity of
information system of object of the critical infrastructure. Information Technology and Security.
Vol. 4, Iss. 2 (7) (2016) 262-268.
[5] S. Kovalenko. Insajderska zahroza jak odna z aktualnyx problem kiberbezpeky. Osnovni metody
vyjavlennja Aktualʹni problemy kiberbezpeky : zb. tez dop. Vseukrajinsʹkoji nauk. konf. (Kyjiv,
24 žovtnja 2019 Kyjiv : DUT) 28–32.
[6] J. Eggenschwiler, I. Agrafiotis, J. RC Nurse, Insider threat response and recovery strategies in
financial services firms. Computer Fraud & Security. Vol. 2016, Iss. 11 (2016) 12-19.
[7] W. F. Gross, Insider Threat. Computer and Information Security Handbook. (2017) 529-536.
[8] Faisal Janjua, Asif Masood, Haider Abbas, Imran Rashid, Handling Insider Threat Through
Supervised Machine Learning Technique. Vol. 177 (2020) 64-71.
[9] Shuhan Yuan, Xintao Wu, Deep Learning for Insider Threat Detection: Review, Challenges and
Opportunities. Computers & Security (2021) 102221.
[10] Z. A. Soomro, M. H. Shah, J. Ahmed, Information security management needs more holistic
approach: A literature review. Vol. 36, Iss. 2 (2016) 215-225.
[11] J. Funke, A. Fischer & D. V. Holt, Competencies for complexity: problem solving in the twenty-first
century. In Assessment and teaching of 21st century skills, pp. 41-53. Springer, Cham (2018).
[12] A. Parrish, J. Impagliazzo, R. K. Raj, H. Santos, M. R. Asghar, A. Jøsang, T. Pereira, E. Stavrou,
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In
Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in
Computer Science Education (ITiCSE 2018 Companion). Association for Computing Machinery,
New York, NY, USA, (2018) 36–54. doi: https://doi.org/10.1145/3293881.3295778.
[13] E. Kashtanova, A. Lobacheva, S. Makushkin, T. Ridho, A Competency Model in the Field of
Information Technology. In: Bogoviz A.V., Suglobov A.E., Maloletko A.N., Kaurova O.V.,
Lobova S.V. (eds) Frontier Information Technology and Systems Research in Cooperative
Economics. Studies in Systems, Decision and Control, vol 316. Springer, Cham (2021)
https://doi.org/10.1007/978-3-030-57831-2_58.
[14] S. Shevchenko, Yu. Zhdanova, Mathematical competencies of future specialists information
security. Suchasniy zahist informatsii. 4 (2016) 90-96.
[15] O. Mandzuk, Qualification requirements to the competence of information analytics-lawyers.
Scientific notes of Taurida National V. Vernadsky University. Juridical Sciences. 26(68) (2018) 64-72.
[16] V.Buryachok, I.Parhomey, M.Stepanov, V.Tolubko. Problemni pytannja ta aktualʹni zavdannja
pidhotovky faxivciv z kibernetyčnoji bezpeky haluzi znanʹ «Informacijni texnolohiji». Suchasniy
zahist informatsii. 2(2016) 4-9.
[17] M. Bohlouli, N. Mittas, G. Kakarontzas, T. Theodosiou, L. Angelis, M. Fathi, Competence
assessment as an expert system for human resource management: A mathematical approach. Expert
Systems with Applications, vol. 70 (2017) 83-102.
[18] V. Belevitin, S. Bogatenkov, V. Rudnev, M. Khasanova, A. Tyunin, Integrated approach to modeling
IC Competence in students. International Journal of Engineering & Technology, 7(4) (2018) 60-62.
[19] S. Lysenko, K. Bobrovnikova & O. Savenko, A botnet detection approach based on the clonal
selection algorithm. In 2018 IEEE 9th International Conference on Dependable Systems,
Services and Technologies (DESSERT). IEEE (2018) 424-428.
[20] S. Lysenko, K. Bobrovnikova, S. Matiukh, I. Hurman & O. Savenko, Detection of the botnets'
low-rate DDoS attacks based on self-similarity. International Journal of Electrical & Computer
Engineering, 2020, 10, 2088-8708.
[21] D. Magis, J. R. Barrada, Computerized adaptive testing with R: Recent updates of the package
catR. Journal of Statistical Software, 76(1) (2017) 1-19.
[22] G. Ling, Y. Attali, B. Finn, E. A. Stone, Is a Computerized Adaptive Test More Motivating Than
a Fixed-Item Test? Applied Psychological Measurement, 41(7) (2017) 495–511.
[23] E. D. Heggestad, D. J. Scheaf, G. C. Banks, M. Monroe Hausfeld, S. Tonidandel, E. B. Williams,
Scale Adaptation in Organizational Science Research: A Review and Best-Practice
Recommendations. Journal of Management, 45(6) (2019) 2596–2627.
[24] Van der Linden, W. J. (Ed.), Handbook of item response theory, three volume set. CRC Press (2018).
[25] O.Boychenko, R.Ziubina. The method of calculation of probability of realization of threats of
information with the limited access from an internal user violator. Information systems and
technologies security. 1 (2019) 19–26.