An empirical approach to identify information misuse by insiders

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Rogue employees with access to sensitive information can easily abuse their access to engage in information theft. To help differentiate malicious from benign behavior, this study measures how participants, given a common search topic, seek information. This study uses double-blind procedures, a stratified sample, and carefully designed control and experimental conditions. We seek to validate previously identified network indicators (ELICIT), find new host-based behaviors, and consider other human attributes that affect the information-use of malicious insiders by comparing their behavior to equivalent non-malicious users. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Caputo, D. D., Stephens, G., Stephenson, B., Cormier, M., & Kim, M. (2008). An empirical approach to identify information misuse by insiders. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5230 LNCS, pp. 402–403). https://doi.org/10.1007/978-3-540-87403-4_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free