A Preliminary Model of Insider Theft of Intellectual Property

@article{Moore2011APM,
  title={A Preliminary Model of Insider Theft of Intellectual Property},
  author={A. Moore and Dawn M. Cappelli and Thomas C. Caron and E. Shaw and D. Spooner and Randall F. Trzeciak},
  journal={J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  year={2011},
  volume={2},
  pages={28-49}
}
A study conducted by the CERT Program at Carnegie Mellon University’s Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 48 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property includes incidents in which the insider’s primary goal is stealing confidential or proprietary information from the… Expand
32 Citations
A pattern for increased monitoring for intellectual property theft by departing insiders
  • 22
  • PDF
Modeling of Insider Threat using Enterprise Automaton
  • Puloma Roy, C. Mazumdar
  • Computer Science
  • 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT)
  • 2018
  • 1
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage
  • 1
  • PDF
Validating an Insider Threat Detection System: A Real Scenario Perspective
  • 12
  • PDF
Modelling of enterprise insider threats
  • Puloma Roy, C. Mazumdar
  • Computer Science
  • 2015 International Conference on Information Systems Security and Privacy (ICISSP)
  • 2015
  • 1
  • PDF
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches
  • 26
  • Highly Influenced
  • PDF
...
1
2
3
4
...

References

SHOWING 1-10 OF 48 REFERENCES
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
  • 96
  • PDF
Data Theft: A Prototypical Insider Threat
  • M. McCormick
  • Business, Computer Science
  • Insider Attack and Cyber Security
  • 2008
  • 29
The Missing Link in Information Security: Three Dimensional Profiling
  • 22
A framework for understanding and predicting insider attacks
  • 315
  • PDF
The Insider Threat to Information Systems
  • 175
  • PDF
Fighting computer crime - a new framework for protecting information
  • D. Parker
  • Political Science, Computer Science
  • 1998
  • 274
...
1
2
3
4
5
...