Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 13 results for the Author - dawn cappelli , Type - White Paper

White Paper | December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated ... By Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

White Paper | July 2009 - White Paper Insider Theft of Intellectual Property for Business Advantage: A ... By Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak

In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.

White Paper | May 2008 - White Paper Management and Education of the Risk of Insider Threat ... By Dawn Cappelli, Akash G. Desai (Information Networking Institute - Carnegie Mellon University), Andrew P. Moore, Timothy J. Shimeall, Elise A. Weaver (Worcester Polytechnic Institute), Bradford J. Willke

In this paper, the authors describe the MERIT insider threat model and simulation results.

White Paper | January 2005 - White Paper Preliminary System Dynamics Maps of the Insider Cyber ... By David F. Andersen (University at Albany State University of New York), Elise A. Weaver (Worcester Polytechnic Institute), Aldo Zagonel (University at Albany - Rockefeller College of Public Affairs and Policy), Dawn Cappelli, Jose J. Gonzalez (Agder University College Norway), Mohammad Mojtahedzadeh (Attune Group - Inc.), Andrew P. Moore, Eliot Rich (University at Albany State University of New York), Jose M. Sarriegui (University of Navarra Spain), Timothy J. Shimeall, Jeffrey M. Stanton (Syracuse University - School of Information Studies)

This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information ... By Eileen Kowalski (United States Secret Service), Dawn Cappelli, Andrew P. Moore

In this paper, the authors present the findings of research examining reported insider incidents in the information technology and telecommunications sectors.

White Paper | October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners ... By Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government ... By Eileen Kowalski (United States Secret Service), Dawn Cappelli, Bradford J. Willke, Andrew P. Moore

In this paper, the authors present the findings of a research effort to examine reported insider incidents in the government sector.

White Paper | December 2008 - White Paper Spotlight On: Programming Techniques Used as an Insider ... By Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.

White Paper | June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the ... By Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.