Rogue employees with access to sensitive information can easily abuse their access to engage in information theft. To help differentiate malicious from benign behavior, this study measures how participants, given a common search topic, seek information. This study uses double-blind procedures, a stratified sample, and carefully designed control and experimental conditions. We seek to validate previously identified network indicators (ELICIT), find new host-based behaviors, and consider other human attributes that affect the information-use of malicious insiders by comparing their behavior to equivalent non-malicious users. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Caputo, D. D., Stephens, G., Stephenson, B., Cormier, M., & Kim, M. (2008). An empirical approach to identify information misuse by insiders. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5230 LNCS, pp. 402–403). https://doi.org/10.1007/978-3-540-87403-4_27
Mendeley helps you to discover research relevant for your work.