Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 9 of 9 results for the Author - randall f. trzeciak , Type - White Paper

White Paper | December 2013 - White Paper Spotlight On: Programmers as Malicious Insiders–Updated ... By Matthew L. Collins, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.

White Paper | October 2015 - White Paper Effective Insider Threat Programs: Understanding and ... By Andrew P. Moore, William E. Novak, Matthew L. Collins, Randall F. Trzeciak, Michael C. Theis

In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.

White Paper | July 2009 - White Paper Insider Theft of Intellectual Property for Business Advantage: A ... By Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Randall F. Trzeciak

In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.

White Paper | October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners ... By Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

White Paper | December 2008 - White Paper Spotlight On: Programming Techniques Used as an Insider ... By Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Randall F. Trzeciak, Andrew P. Moore

In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.

White Paper | February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners By Robert Weiland (Carnegie Mellon University), Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.

White Paper | June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the ... By Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.

White Paper | March 2009 - White Paper Spotlight On: Malicious Insiders with Ties to the Internet ... By Michael Hanley, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak

In this report, the authors focus on insider threat cases in which the insider had relationships with the internet underground community.

White Paper | January 2009 - White Paper Common Sense Guide to Prevention and Detection of Insider ... By Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak, Timothy J. Shimeall

In this paper, the authors present findings from examining insider crimes in a new way and add new practices that were not present in the second edition.