A Preliminary Model of Insider Theft of Intellectual Property

@article{Moore2011APM,
  title={A Preliminary Model of Insider Theft of Intellectual Property},
  author={A. P. Moore and Dawn M. Cappelli and Thomas C. Caron and E. Shaw and D. Spooner and Randall F. Trzeciak},
  journal={J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  year={2011},
  volume={2},
  pages={28-49}
}
  • A. P. Moore, Dawn M. Cappelli, +3 authors Randall F. Trzeciak
  • Published 2011
  • Computer Science
  • J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
  • A study conducted by the CERT Program at Carnegie Mellon University’s Software Engineering Institute analyzed hundreds of insider cyber crimes across U.S. critical infrastructure sectors. Follow-up work involved detailed group modeling and analysis of 48 cases of insider theft of intellectual property. In the context of this paper, insider theft of intellectual property includes incidents in which the insider’s primary goal is stealing confidential or proprietary information from the… CONTINUE READING
    32 Citations

    Figures, Tables, and Topics from this paper

    Explore Further: Topics Discussed in This Paper

    A pattern for increased monitoring for intellectual property theft by departing insiders
    • 21
    • PDF
    Modeling of Insider Threat using Enterprise Automaton
    • Puloma Roy, C. Mazumdar
    • Computer Science
    • 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT)
    • 2018
    A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage
    • 1
    • PDF
    Validating an Insider Threat Detection System: A Real Scenario Perspective
    • 12
    • PDF
    Modelling of enterprise insider threats
    • Puloma Roy, C. Mazumdar
    • Computer Science
    • 2015 International Conference on Information Systems Security and Privacy (ICISSP)
    • 2015
    • 1
    • PDF
    A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches
    • 26
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 48 REFERENCES
    The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures
    • 95
    • PDF
    Data Theft: A Prototypical Insider Threat
    • M. McCormick
    • Business, Computer Science
    • Insider Attack and Cyber Security
    • 2008
    • 29
    Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
    • 100
    • PDF
    The Missing Link in Information Security: Three Dimensional Profiling
    • 22
    A framework for understanding and predicting insider attacks
    • 312
    • PDF
    The Insider Threat to Information Systems
    • 173
    • PDF
    Fighting computer crime - a new framework for protecting information
    • D. Parker
    • Political Science, Computer Science
    • 1998
    • 272