Proceedings of the 2006 Winter Simulation Conference 2006
DOI: 10.1109/wsc.2006.323130
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Emergence of Insider Threat Vulnerabilities

Abstract: In this paper, we present insights generated by modeling the emergence of insider threat vulnerabilities in organizations. In our model, we integrate concepts from social judgment theory, signal detection theory, and the cognitive psychology of memory and belief formation. With this model, we investigate the emergence of vulnerabilities (especially that are insider-driven) in complex systems characterized by high levels of feedback complexity, multiple actors, and the presence of uncertainty in the judgment an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Dutta and Roy (2006) built and discussed the most substantial work on cyber security in the system dynamics literature to date, a model looking at compliance with information security protocols, as well as investment in training and technology. The system dynamics community has studied a limited number of cyber security topics, including insider threat (Rich et al 2005, Martinez-Moyano et al 2006, system vulnerability (Radianti et al 2009, Goldsmith and Siegel 2010, Goldsmith and Siegel 2012, general theories of human factors and security Sawicka 2003, Hillen et al 2006) We created a model that uses system dynamics to simulate organizational decisions about whether and how much to participation in cooperative cyber programs. The model allows explicit representation of decision-making strategies, and enables exploration of different scenarios.…”
Section: Previous Researchmentioning
confidence: 99%
“…Dutta and Roy (2006) built and discussed the most substantial work on cyber security in the system dynamics literature to date, a model looking at compliance with information security protocols, as well as investment in training and technology. The system dynamics community has studied a limited number of cyber security topics, including insider threat (Rich et al 2005, Martinez-Moyano et al 2006, system vulnerability (Radianti et al 2009, Goldsmith and Siegel 2010, Goldsmith and Siegel 2012, general theories of human factors and security Sawicka 2003, Hillen et al 2006) We created a model that uses system dynamics to simulate organizational decisions about whether and how much to participation in cooperative cyber programs. The model allows explicit representation of decision-making strategies, and enables exploration of different scenarios.…”
Section: Previous Researchmentioning
confidence: 99%
“…Information security has been explored by using the system dynamics approach to focus on a number of topics, including the insider threat and attack problem [1,23,26], understanding security risks [30], and increasing learning and risk perception [6,14,15,22], among others [for a good collection of papers on the topic, see 13]. Specifically, our previous work related to insider threat identification and mitigation was based on empirical evidence collected by researchers of the CERT Coordination Center at Carnegie Mellon University's Software Engineering Institute with the U.S. Secret Service.…”
Section: Information Security Modelsmentioning
confidence: 99%
“…In reinforcement learning models, learning is achieved by identifying the outcomes of actions and decisions and assigning utility that promotes improvement. For example, MartinezMoyano et al [22,23], when studying insider-threat activities and vulnerabilities, use a reinforcement learning model to capture the mechanism used by security officers to determine the level of cutoff that maximizes identification of insider activity.…”
Section: Information Security Modelsmentioning
confidence: 99%
See 2 more Smart Citations