Abstract
Statistics show that most crimes are committed by individuals known to the victims. In the computing industry, we can draw a parallel to that and show that most computer crimes involve trusted insiders. There have been numerous models proposed for analyzing and mitigating the insider threat problem. However, there has been relatively little effort to collect viable scientific data to support detection and prevention models that can be uniformly applied across different organization. The dynamic nature of the problem and the fact that it involves a human element makes it an immensely difficult problem to solve. One of the immediate problems with researching this issue is that there is no single concise definition of what exactly constitutes the insider problem. In this paper, we investigate the prior work in this field and discuss some additional thoughts that are relative to current research in terms of defining the insider threat.
Original language | American English |
---|---|
Title of host publication | Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government |
State | Published - Jul 16 2012 |
Disciplines
- Databases and Information Systems
Keywords
- Human element
- Insider threat
- Organizational security