Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions

@article{Boehmer2010AnalyzingHB,
  title={Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions},
  author={Wolfgang Boehmer},
  journal={2010 24th IEEE International Conference on Advanced Information Networking and Applications},
  year={2010},
  pages={1189-1194}
}
Whether programs are called data loss prevention, content monitoring and filtering, employee activity monitoring, counter corruption, insider trading, or fraud detection, organizations have increasingly implemented projects and initiatives to examine and address insider threats. Insider-perpetrated computer crime is committed by individuals who have permission to use a system, and it is, therefore, based on the actions of trusted users. Most information walks out the front door, not through the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

A Technical Review on Data Leakage Detection and Prevention Approaches

C. Mercy Praba
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risks with Game Theory

  • 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 27 REFERENCES

Sarbanes-Oxley Act, U.S. Congress

Sarbanes, Oxley
  • 2002.
  • 2002
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Information Security - The Fourth Wave

  • Computers & Security
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Countering Insider Threats in Personal Devices

  • 2007 IEEE Intelligence and Security Informatics
  • 2007
VIEW 1 EXCERPT

A Security Event Management Framework Using Wavelet and Data-Mining Technique

  • 2006 International Conference on Communications, Circuits and Systems
  • 2006
VIEW 1 EXCERPT