2018
DOI: 10.2172/1452870
|View full text |Cite
|
Sign up to set email alerts
|

Spy the Lie: Detecting Malicious Insiders

Abstract: Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 87 publications
1
6
0
3
Order By: Relevance
“…Starting from a harm-oriented perspective, the insider threat definition depends on whether or not the insider has the intention to harm the organization. Generally, a distinction is made between malicious and non-malicious insider threats (Bunn & Sagan, 2016;Noonan, 2018;Nurse et. al., 2014;Sarkar, 2010).…”
Section: Harm-oriented Perspectivementioning
confidence: 99%
See 1 more Smart Citation
“…Starting from a harm-oriented perspective, the insider threat definition depends on whether or not the insider has the intention to harm the organization. Generally, a distinction is made between malicious and non-malicious insider threats (Bunn & Sagan, 2016;Noonan, 2018;Nurse et. al., 2014;Sarkar, 2010).…”
Section: Harm-oriented Perspectivementioning
confidence: 99%
“…Here, it is imprecise whether it relates to intentional or unintentional unauthorized access, use or disclosure. Also the definitions of Padayachee (2016), Gelles (2016), and Greitzer, Kangas, Noonan, Dalton & Hohimer (2012), the latest also used by Noonan (2018), Krull (2016) and BaMaung, McIlhatton, MacDonald & Beattie (2018), refrain from explicitly mentioning the intentionality of the misuse of the privilege. Therefore, they leave too much ambiguity on whether or not insiders that unwittingly misconduct fall under the scope of the insider threat concept.…”
Section: Privilege-oriented Perspectivementioning
confidence: 99%
“…Unter Betrug wird vorsätzliche Täuschung verstanden, um einen rechtswidrigen oder unberechtigten Nutzen zu erwirken (Noonan 2018). Betrug nimmt viele Formen an, u. a. Identitätsdiebstahl, Wirtschaftskriminalität und Marktmanipulation.…”
Section: Betrugunclassified
“…Noch früher setzt die Maßnahme an, Mitarbeiter vor deren Einstellung, je nach Zugang zu kritischen Informationen, entsprechend zu überprüfen (Noonan 2018). Je nach Art der Organisation gibt es dafür verschiedene rechtlich zulässige Möglichkeiten, wie z.…”
Section: Präventive Maßnahmenunclassified
See 1 more Smart Citation