Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 63 results for the Type - Article

Article | May 2017 - Article Graduate Curricula in Software Engineering and Software ... By Thomas B. Hilburn (Embry-Riddle Aeronautical University), Andrew J. Kornecki (Embry-Riddle Aeronautical University)

This paper discusses two related efforts to provide guidance about improving professional software engineering through graduate education.

Article | November 2016 - Article Giant Slayer: Will You Let Software be David to Your Goliath ... By Stephen Blanchette - Jr.

The article discusses what can (and should) be done to improve the state of software engineering on large scale aerospace programs.

Article | April 2016 - Article An Agent-Based Approach to Modeling Insider Threat By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)

In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.

Article | April 2016 - Article Inadvertent Leaks: Exploration via Agent-Based Dynamic ... By Kathleen Carley (Carnegie Mellon School of Computer Science), Geoffrey P. Morgan (Carnegie Mellon School of Computer Science)

In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.

Article | April 2016 - Article Introduction to the Special Issue on Insider Threat Modeling ... By Andrew P. Moore, Kirk A. Kennedy (Federal Bureau of Investigation), Thomas J. Dover (Federal Bureau of Investigation)

In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.

Article | April 2016 - Article Compliance Signaling Games: Toward Modeling the ... By William Casey, Jose A. Morales, Evan Wright, Quanyan Zhu (New York University), Bud Mishra (New York University)

In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.

Article | April 2016 - Article Using Dynamic Models to Support Inferences of Insider Threat ... By Paul J. Sticha (Human Resources Research Organization), Elise T. Axelrad (Human Resources Research Organization)

In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.

Article | January 2016 - Article CYBURGH, PA: Using Technology Wisely to Protect Your ... By Greg Porter (Heinz College at Carnegie Mellon University)

In this teQ Magazine article, Greg Porter discusses the role technology plays in solving today's cybersecurity challenges.

Article | January 2016 - Article CYBURGH, PA: Solving the Workforce Shortfall in ... By Christopher May

In this teQ Magazine article, Chris May discusses how the cybersecurity workforce shortage hampers our ability to deal with cyberattacks and data breaches.

Article | January 2016 - Article CYBURGH, PA: Using Process to Tame Technology By Matthew J. Butkovic

In this teQ Magazine article, Matt Butkovic discusses the role process plays solving today's cybersecurity challenges.

Refine