Information security insider threat visualization: Theft of intellectual property

被引:0
|
作者
Zaytsev, A.S. [1 ]
Malyuk, A.A. [1 ,2 ]
机构
[1] National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia
[2] Financial University under the Government of the Russian Federation, Moscow, Russia
来源
Scientific Visualization | 2015年 / 7卷 / 03期
关键词
Behavioral model - Imitation models - Insider Threat - System Dynamics - System dynamics model;
D O I
暂无
中图分类号
学科分类号
摘要
Paper deals with the problem of insider threat visualization. An insider threat classification is adduced, method of visualization of insider threats using system dynamics modeling is considered and forecasting behavioral models for threats of theft of intellectual property for business advantages alone and with accomplices are developed. © 2015, National Research Nuclear University. All rights reserved.
引用
收藏
页码:53 / 68
相关论文
共 50 条
  • [21] Outsourcing and the insider threat: An increasing security risk
    Colwill, Carl
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 77 - 86
  • [22] An Insider Threat Activity in a Software Security Course
    Krutz, Daniel E.
    Meneely, Andrew
    Malachowsky, Samuel A.
    FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015, 2015, : 411 - 416
  • [23] Intellectual property disclosure as threat
    Baker, Scott
    Lee, Pak Yee
    Mezzetti, Claudio
    INTERNATIONAL JOURNAL OF ECONOMIC THEORY, 2011, 7 (01) : 21 - 38
  • [24] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (03): : 55 - 63
  • [25] Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons
    Shiffman, Gary M.
    Gupta, Ravi
    INTERNATIONAL JOURNAL OF THE COMMONS, 2013, 7 (01): : 92 - 112
  • [26] Human factors in information security: The insider threat - Who can you trust these days?
    Colwill, Carl
    Information Security Technical Report, 2009, 14 (04): : 186 - 196
  • [27] Combating Piracy: Intellectual Property Theft and Fraud
    Garry, Peggy
    PUBLISHING RESEARCH QUARTERLY, 2010, 26 (02) : 144 - 145
  • [28] Intellectual Property Theft and Fraud: Combating Piracy
    Liu, Haiyan
    INTERNATIONAL CRIMINAL JUSTICE REVIEW, 2008, 18 (02) : 244 - 246
  • [29] DICKINSON 'ALONE AND IN A CIRCUMSTANCE' AND THE THEFT OF INTELLECTUAL PROPERTY
    RANTA, J
    ESQ-A JOURNAL OF THE AMERICAN RENAISSANCE, 1995, 41 (01): : 64 - 95
  • [30] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113