Showing 1 - 10 of 13 results for the Author - dawn cappelli , Type - White Paper
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
In this paper, the authors describe the MERIT insider threat model and simulation results.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.
In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.
In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.