Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Tracy Cassidy
August 2018 - Podcast Workplace Violence and Insider Threat

Topics: Insider Threat

Tracy Cassidy and Carrie Gardner, researchers with the CERT National Insider Threat Center, discuss research on using technology to detect an employee’s intent to cause physical harm.

October 2017 - Presentation Technical Detection of Intended Violence against Self or Others

Topics: Insider Threat

Authors: Tracy Cassidy

Presentation on research to use insider threat tools to detect indicators of employees who are may be on a path to harm themselves and/or others within the workplace

October 2017 - Poster Technical Detection of Intended Violence Against Self or Others

Topics: Insider Threat

Authors: Tracy Cassidy

Poster on research into determining the extent to which it is possible to technically detect indicators of employees who may be on a path to harm themselves and/or others within the workplace via insider threat detection tools

December 2016 - Technical Report Common Sense Guide to Mitigating Insider Threats, Fifth Edition

Topics: Insider Threat

Presents recommendations for mitigating insider threat based on CERT's continued research and analysis of over 1,000 cases.

December 2016 - Technical Report The Critical Role of Positive Incentives for Reducing Insider Threats

Topics: Insider Threat

This report describes how positive incentives complement traditional practices to provide a better balance for organizations' insider threat programs.

July 2014 - Conference Paper Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector

Topics: Insider Threat

In this paper, the authors provide documented research to advance the understanding of the unintentional insider threat (UIT) that results from phishing and other social engineering cases, specifically those involving malicious software (malware).

April 2014 - Technical Report International Implementation of Best Practices for Mitigating Insider Threat: Analyses for India and Germany

Topics: Insider Threat

This report analyzes insider threat mitigation in India and Germany, using the new framework for international cybersecurity analysis described in the paper titled “Best Practices Against Insider Threats in All Nations.”