Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 2 of 2 results for the Author - timothy j. shimeall , Publish Year - 2005 , Type - White Paper

White Paper | January 2005 - White Paper Preliminary System Dynamics Maps of the Insider Cyber ... By David F. Andersen (University at Albany State University of New York), Elise A. Weaver (Worcester Polytechnic Institute), Aldo Zagonel (University at Albany - Rockefeller College of Public Affairs and Policy), Dawn Cappelli, Jose J. Gonzalez (Agder University College Norway), Mohammad Mojtahedzadeh (Attune Group - Inc.), Andrew P. Moore, Eliot Rich (University at Albany State University of New York), Jose M. Sarriegui (University of Navarra Spain), Timothy J. Shimeall, Jeffrey M. Stanton (Syracuse University - School of Information Studies)

This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.