A Preliminary Model of Insider Theft of Intellectual Property

@article{Moore2011APM,
  title={A Preliminary Model of Insider Theft of Intellectual Property},
  author={Andrew P. Moore and Dawn M. Cappelli and Thomas C. Caron and Eric D. Shaw and Derrick Spooner and Randall F. Trzeciak},
  journal={JoWUA},
  year={2011},
  volume={2},
  pages={28-49}
}
ix 
Highly Cited
This paper has 46 citations. REVIEW CITATIONS

From This Paper

Figures and tables from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 24 extracted citations

Scenario-Based Insider Threat Detection From Cyber Activities

IEEE Transactions on Computational Social Systems • 2018
View 7 Excerpts
Highly Influenced

Modeling of Insider Threat using Enterprise Automaton

2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT) • 2018
View 1 Excerpt

EAR: An e-mail Attachment Receiver to Search Concerning Images in the Context of Insider Threat

2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) • 2016

References

Publications referenced by this paper.
Showing 1-10 of 33 references

Randall; & Shimeall

Dawn Cappelli, Andrew Moore, Trzeciak
Timothy J. Common Sense Guide to Prevention and Detection of Insider Threat 3 Edition – Version 3.1. Software Engineering Institute and CyLab, Carnegie Mellon University, • 2009
View 1 Excerpt

McCormick 2008 ] McCormick , Michael . “ Data Theft : A Prototypical Insider Threat , ” 53 - 68

P. Andrew, Dawn M. Cappelli, F. Randall
2008

Michael

McCormick
“Data Theft: A Prototypical Insider Threat,” 53-68. Insider Attack and Cyber Security: Beyond the Hacker,Springer US, • 2008
View 1 Excerpt

The ‘Big Picture

Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak
Insider Attack and Cyber Security: Beyond the Hacker, Springer US, • 2008

Akash

Dawn Cappelli, Desai
G.; Moore, Andrew P.; Shimeall, Timothy J.; Weaver, Elise A.; & Willke, Bradford J. “Management and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers' Information, Systems, or Networks.” Proceedings of the 24th International System Dynamics Conference. Nij • 2006
View 1 Excerpt

Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis (CMU/SEI-2006-TR-026, ESC-TR-2006-091)

Stephen R. Band, Dawn M. Cappelli, +3 authors Randall F. Trzeciak
2006

Similar Papers

Loading similar papers…