Citation

Espionage and Intellectual Property Theft (Insider Threat): Experimental Design and Findings

Abstract | Word Stems | Keywords | Association | Citation | Similar Titles



Abstract:

The insider threat has been reported to be the second greatest cyber security threat. The “insider” is an individual authorized to access an organization’s information system. The insider threat is manifested when human behavior departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies. The types of crimes associated with insider threats are significant: espionage, terrorism and sabotage. On behalf of the federal government, a team of social scientists and engineers experimentally explored how malicious insiders use information differently from a benign baseline group. The research design and results are presented in this paper.
Convention
All Academic Convention makes running your annual conference simple and cost effective. It is your online solution for abstract management, peer review, and scheduling for your annual meeting or convention.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

Association:
Name: American Psychology - Law Society
URL:
http://www.ap-ls.org/


Citation:
URL: http://citation.allacademic.com/meta/p398797_index.html
Direct Link:
HTML Code:

MLA Citation:

Caputo, Deanna., Stephens, Greg. and Stephenson, Brad. "Espionage and Intellectual Property Theft (Insider Threat): Experimental Design and Findings" Paper presented at the annual meeting of the American Psychology - Law Society, Westin Bayshore Hotel, Vancouver, BC, Canada, Mar 18, 2010 <Not Available>. 2014-11-28 <http://citation.allacademic.com/meta/p398797_index.html>

APA Citation:

Caputo, D. D., Stephens, G. and Stephenson, B. , 2010-03-18 "Espionage and Intellectual Property Theft (Insider Threat): Experimental Design and Findings" Paper presented at the annual meeting of the American Psychology - Law Society, Westin Bayshore Hotel, Vancouver, BC, Canada <Not Available>. 2014-11-28 from http://citation.allacademic.com/meta/p398797_index.html

Publication Type: Conference Paper/Unpublished Manuscript
Review Method: Peer Reviewed
Abstract: The insider threat has been reported to be the second greatest cyber security threat. The “insider” is an individual authorized to access an organization’s information system. The insider threat is manifested when human behavior departs from compliance with established policies, regardless of whether it results from malice or a disregard for security policies. The types of crimes associated with insider threats are significant: espionage, terrorism and sabotage. On behalf of the federal government, a team of social scientists and engineers experimentally explored how malicious insiders use information differently from a benign baseline group. The research design and results are presented in this paper.


Similar Titles:
Neutralizing Intellectual Property Theft: An Empirical Examination

Valuing Intellectual Property: An Experiment

Common Threats or Segmented Opportunities? North-North Divisions Over Intellectual Property Rights in the South

Are Sanctions Threats Effective?: Evidence from the Area of Intellectual Property Rights (IPR) Protection


 
All Academic, Inc. is your premier source for research and conference management. Visit our website, www.allacademic.com, to see how we can help you today.