Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 9 of 9 results for the Author - derrick spooner

Technical Note | December 2016 - Technical Note Low Cost Technical Solutions to Jump Start an Insider Threat ... By George Silowash, Derrick Spooner, Daniel L. Costa, Michael J. Albrethsen

This technical note explores free and low cost technical solutions to help organizations prevent, detect, and respond to malicious insiders.

Technical Report | May 2016 - Technical Report An Insider Threat Indicator Ontology By Daniel L. Costa, Michael J. Albrethsen, Matthew L. Collins, Samuel J. Perl, George Silowash, Derrick Spooner

This report presents an ontology for insider threat indicators, describes how the ontology was developed, and outlines the process by which it was validated.

Technical Note | May 2013 - Technical Note Spotlight On: Insider Theft of Intellectual Property Inside the ... By Matthew L. Collins, Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors provide a snapshot of individuals involved in insider threat cases and recommends how to mitigate the risk of similar incidents.

Technical Note | June 2011 - Technical Note A Preliminary Model of Insider Theft of Intellectual Property By Andrew P. Moore, Dawn Cappelli, Thomas C. Caron (John Heinz III College - School of Information Systems Management, Carnegie Mellon University), Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak

In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data.

White Paper | July 2018 - White Paper Navigating the Insider Threat Tool Landscape: Low-Cost ... By Derrick Spooner, George Silowash, Daniel L. Costa, Michael J. Albrethsen

This paper explores low cost technical solutions that can help organizations prevent, detect, and respond to insider incidents.

Conference Paper | November 2014 - Conference Paper An Ontology for Insider Threat Indicators By Daniel L. Costa, Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen, George Silowash, Derrick Spooner

In this paper, the authors describe their ongoing development of an insider threat indicator ontology.

White Paper | October 2012 - White Paper Spotlight On: Insider Threat from Trusted Business Partners ... By Todd Lewellen, Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner, Robert Weiland (Carnegie Mellon University)

In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.

White Paper | June 2009 - White Paper Spotlight On: Insider Theft of Intellectual Property Inside the ... By Derrick Spooner, Dawn Cappelli, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.

White Paper | February 2010 - White Paper Spotlight On: Insider Threat from Trusted Business Partners By Robert Weiland (Carnegie Mellon University), Andrew P. Moore, Dawn Cappelli, Randall F. Trzeciak, Derrick Spooner

In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.