Topics: Insider Threat
Authors: Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
Topics: Insider Threat
Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak
In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.
Topics: Insider Threat
Authors: Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
Topics: Insider Threat
Authors: Dawn Cappelli, Thomas C. Caron (John Heinz III College, School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore
In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.