Information security insider threat visualization: Theft of intellectual property

被引:0
|
作者
Zaytsev, A.S. [1 ]
Malyuk, A.A. [1 ,2 ]
机构
[1] National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia
[2] Financial University under the Government of the Russian Federation, Moscow, Russia
来源
Scientific Visualization | 2015年 / 7卷 / 03期
关键词
Behavioral model - Imitation models - Insider Threat - System Dynamics - System dynamics model;
D O I
暂无
中图分类号
学科分类号
摘要
Paper deals with the problem of insider threat visualization. An insider threat classification is adduced, method of visualization of insider threats using system dynamics modeling is considered and forecasting behavioral models for threats of theft of intellectual property for business advantages alone and with accomplices are developed. © 2015, National Research Nuclear University. All rights reserved.
引用
收藏
页码:53 / 68
相关论文
共 50 条
  • [31] Theft of information and the concept of property in the information age
    Nigri, DF
    PROPERTY PROBLEMS: FROM GENES TO PENSION FUNDS, 1997, 1 : 48 - 60
  • [32] Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft
    Shaikh, Asif
    HCI INTERNATIONAL 2018 - POSTERS' EXTENDED ABSTRACTS, PT III, 2018, 852 : 314 - 317
  • [33] Engineering Security Agreements Against External Insider Threat
    Franqueira, Virginia
    van Cleeff, Andre
    van Eck, Pascal
    Wieringa, Roel
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2013, 26 (04) : 66 - 91
  • [34] Research On Security Architecture MSIS For Defending Insider Threat
    Wang, Hui
    Han, Dongmei
    Liu, Shufen
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 389 - 392
  • [35] INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY
    Zatonatskiy, D.
    Marhasova, V
    Korogod, N.
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2021, 1 (36): : 149 - 158
  • [36] Intellectual property rights and US information goods exports: the role of imitation threat
    Weng, Yungho
    Yang, Chih-Hai
    Huang, Yi-Ju
    JOURNAL OF CULTURAL ECONOMICS, 2009, 33 (02) : 109 - 134
  • [37] PURCHASE OR PIRATE: A MODEL OF CONSUMER INTELLECTUAL PROPERTY THEFT
    McCorkle, Denny
    Reardon, James
    Dalenberg, Douglas
    Pryor, Andrew
    Wicks, John
    JOURNAL OF MARKETING THEORY AND PRACTICE, 2012, 20 (01) : 73 - 86
  • [38] A global consumer decision model of intellectual property theft
    Reardon, James
    McCorkle, Denny
    Radon, Anita
    Abraha, Desalegn
    JOURNAL OF RESEARCH IN INTERACTIVE MARKETING, 2019, 13 (04) : 509 - 528
  • [39] Visualization in Information Security
    Schweitzer, Dino
    Fulton, Steven
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 288 - 296
  • [40] Algorithm of optimal security hardening measures against insider threat
    Chen, Xiaojun
    Shi, Jinqiao
    Xu, Fei
    Pu, Yiguo
    Guo, Li
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1565 - 1577