Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Derrick  Spooner
July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program

Topics: Insider Threat

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat Program

Topics: Insider Threat

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

May 2016 - Technical Report An Insider Threat Indicator Ontology

Topics: Insider Threat

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

November 2014 - Conference Paper An Ontology for Insider Threat Indicators

Topics: Insider Threat

In this paper, the authors describe their ongoing development of an insider threat indicator ontology.

May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)

Topics: Insider Threat

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.

October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised

Topics: Insider Threat

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

June 2011 - Technical Note A Preliminary Model of Insider Theft of Intellectual Property

Topics: Insider Threat

In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.

February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners

Topics: Insider Threat

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.

June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2009)

Topics: Insider Threat

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.