Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Derrick  Spooner
July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost Technical Solutions to Jump-Start an Insider Threat Program

Topics: Insider Threat

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat Program

Topics: Insider Threat

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

May 2016 - Technical Report An Insider Threat Indicator Ontology

Topics: Insider Threat

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

November 2014 - Conference Paper An Ontology for Insider Threat Indicators

Topics: Insider Threat

In this paper, the authors describe their ongoing development of an insider threat indicator ontology.

May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2013)

Topics: Insider Threat

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.

October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners Version 2: Updated and Revised

Topics: Insider Threat

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

June 2011 - Technical Note A Preliminary Model of Insider Theft of Intellectual Property

Topics: Insider Threat

In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.

February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners

Topics: Insider Threat

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.

June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations (2009)

Topics: Insider Threat

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.