Ignacio J. Martinez-Moyano

Learn More
Dawn M. Cappelli CERT/CC Software Engineering Institute dmc@cert.org Andrew P. Moore CERT/CC Software Engineering Institute apm@cert.org Timothy J. Shimeall CERT/CC Software Engineering Institute, USA, tjs@cert.org David F. Andersen University at Albany State University of New York david.andersen@albany.edu Jose J. Gonzalez Agder University College Norway(More)
Electronic government has been defined as the use of information and communication technologies in government settings. However, it is neither a homogeneous nor a static phenomenon. Recent empirical studies have identified two important dynamics in e-government evolution. First, egovernment in general has evolved from its initial presence on the Internet to(More)
The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information technology security violations and on a case study created to explain the dynamics observed in that data, the authors constructed a system dynamics model of a theory of the development of insider-threat risks and conducted numerical(More)
In general terms, e-government can be defined as the use of information and communication technologies in government settings. However, it is neither a homogeneous nor a static phenomenon. In recent years, empirical studies have identified two interesting dynamics in e-government evolution. First, e-government has evolved from its initial presence on the(More)
The system dynamics group at the Rockefeller College of the University at Albany has been developing techniques to create system dynamic models with groups of managers during the last 25 years. Building upon their tradition in decision conferencing, the group has developed a particular style that involves a facilitation team in which people play different(More)
1 Mr. Akcam’s contributions to this paper were developed during a summer internship at Argonne National Laboratory in 2007. Abstract This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and(More)
Recently national, state, and local governments from many countries have been attempting to reform their administrative structure, processes, and regulatory frameworks. E-government can be seen as a powerful approach for government administrative reform. The dynamics and evolution of egovernment is a complex process resulting from strategic behavior,(More)
In this paper, we present insights generated by modeling the emergence of insider threat vulnerabilities in organizations. In our model, we integrate concepts from social judgment theory, signal detection theory, and the cognitive psychology of memory and belief formation. With this model, we investigate the emergence of vulnerabilities (especially that are(More)