2009
DOI: 10.1109/msp.2009.110
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Insider Theft of Trade Secrets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
29
2

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(35 citation statements)
references
References 4 publications
1
29
2
Order By: Relevance
“…We expect future work to use modeling and simulation to identify and evaluate the effectiveness of deterrent measures in the workplace, such as those suggested in Data Theft: A Prototypical Insider Threat [McCormick 2008]. Experiments such as those conducted at Mitre can also help validate hypotheses about the problem and test deterrent measures [Caputo 2009]. Prospective studies of these phenomena will always be challenging because of low base rates.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We expect future work to use modeling and simulation to identify and evaluate the effectiveness of deterrent measures in the workplace, such as those suggested in Data Theft: A Prototypical Insider Threat [McCormick 2008]. Experiments such as those conducted at Mitre can also help validate hypotheses about the problem and test deterrent measures [Caputo 2009]. Prospective studies of these phenomena will always be challenging because of low base rates.…”
Section: Resultsmentioning
confidence: 99%
“…This study was based on the espionage and insider threat data collected by the Defense Personnel Security Research Center (PERSEREC) [Fischer 1993] ] [Shaw 2005]. In addition, social science experiments within organizations, such as those conducted at Mitre [Caputo 2009], can help validate hypotheses about the problem generated through empirical work such as described in this paper, as well as test deterrent measures against the threat patterns seen in cases of insider compromise.…”
mentioning
confidence: 99%
“…Instead of all employees having to deal with the same procedures from day 1, increased levels of assurance can be implemented for new employees, with the restrictions gradually reduced the longer an employee stays in the organization -assurance should evolve to trust over time. Reducing the need for productivity-driven violations also improves the security experts' ability to protect the organization: reduction of the 'noise' introduced by productivity-driven 'legitimate' violations enables the implementation of clever monitoring implementations to identify malicious activity (insider or outsider attacks) [38].…”
Section: Balancing Trust and Assurancementioning
confidence: 99%
“…The definition of trust as "willingness to be vulnerable based on positive expectations about the actions of others" [39] may sound like an oxymoron to oldschool command and control security managers, but organisations where employees have increased responsibilities are more likely to establish a high-level of security awareness and improved understanding of the need for security [15][28] [40]. On the other hand, employees that abuse trust should be visibly punished; clever monitoring implementations can detect employee trust abuse [41] and employees that observe sanctions enforced, are less likely to attempt to knowingly abuse trust.…”
Section: Adjusting the Cost-benefit Perceptionmentioning
confidence: 99%