References
Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston
Carley KM (2002) Smart agents and organizations of the future. Handb New Media 12:206–220
Carley KM (2003) Dynamic network analysis. Dynamic social network modeling and analysis: workshop summary and papers. Committee on Human Factors, National Research Council, Washington, pp 133–145
Carley KM (2006) A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. DTIC Document
CERT Insider Threat Team (2013) Unintentional insider threats: a foundational study. Technical Report CMU/SEI-2013-TN-022, Software Engineering Institute, Pittsburgh
Cioffi-Revilla C (2014) Introduction to computational social science: principles and applications. Springer, London and Heidelberg
Cohen F (1999) Simulating cyber attacks, defences, and consequences. Comput Secur 18(6):479–518
Contractor NS, Monge PR, Leonardi PM (2011) Multidimensional networks and the dynamics of sociomateriality: bringing technology inside the network. Int J Commun 5:682–720
Duran F, Conrad SH, Conrad GN, Duggan DP, Held EB (2009) Building a system for insider security. IEEE Secur Priv 6:30–38
Epstein JM, Axtell R (1996) Growing artificial societies: social science from the bottom up. Brookings Institution Press, Washington
Freeman LC (2004) The development of social network analysis: a study in the sociology of science. Empirical Press, Vancouver
Gilbert N (2008) Agent-based models. SAGE Publications Inc, New York
Gupta M, Rees J, Chaturvedi A, Chi J (2006) Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis Support Syst 41(3):592–603
Herbig KL (2008) Changes in Espionage by Americans, 1947–2007 (PERSEREC Technical Report No. 08-05). Defense Personnel and Security Research Center (PERSEREC). Retrieved from https://www.scribd.com/doc/192035027/Katherine-L-Herbig-Changes-in-Espionage-by-Americans-1947-2007-Technical-Report-08-05-Northrop-Grumman-March-2008
Hubbard DW (2009) The failure of risk management. Wiley, Hoboken
INSA (2013) A preliminary examination of insider threat programs in the U.S. Private Sector. Intelligence and national security alliance. Retrieved from http://www.insaonline.org/i/d/a/b/InsiderThreat_embed.aspx
Kandias M, Mylonas A, Virvilis N, Theoharidou M, Gritzalis D (2010) An insider threat prediction model. In Katsikas S, Lopez J, Soriano M (eds) Trust, privacy and security in digital business. Springer, Berlin Heidelberg, p 26–37 Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-15152-1_3
Lanham MJ (2015) Rapid mission assurance assessment via sociotechnical modeling and simulation. Dissertations. Paper 536
Lanham MJ, Morgan GP, Carley KM (2011) Data-driven diffusion modeling to examine deterrence. In: IEEE presented at the network science workshop (NSW), 2011, p 1–8
Leonard R (2010) Von Neumann, Morgenstern, and the creation of game theory. Cambridge University Press, New York
Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE international presented at the requirements engineering conference, p 151–161
Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider-threat risks: a system dynamics approach. ACM Trans Model Comput Simul 18(2):7:1–7:27. doi:10.1145/1346325.1346328
Moore AP, Carley KM, Collins ML, Altman NW (2015) Social network dynamics of insider threats: a preliminary model. In: Proceedings of the international conference of the system dynamics society. System Dynamics Society, Boston
Moore AP, Novak WE, Collins ML, Trzeciak RF, Theis MC (2015b) Effective insider threat programs: understanding and avoiding potential pitfalls. Software Engineering Institute White Paper, Pittsburgh
Moreno JL (1934) Who shall survive? A new approach to the problem of human interrelations. Nervous and Mental Disease Publishing Co., Beacon House
Myerson RB (1991) Game theory: analysis of conflict. Harvard University Press, Cambridge
Neapolitan RE (1990) Probabilistic reasoning in expert systems: theory and algorithms. Wiley, New York
Office of the Press Secretary (2011) Executive Order 13587—Structural reforms to improve the security of classified networks and the responsible sharing and safeguarding of classified information. The White House. https://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net
Pearl J (1985) Bayesian networks; a model of self-activated memory for evidential reasoning. In: Proceedings of the 7th Conference of the Cognitive Science Society, University of California, Irvine, p 329–334
Pearl J (1988) Probabilistic reasoning in intelligent systems. Morgan Kaufman, San Francisco
Sarbin TR, Carney RM, Eoyang C (1994) Citizen Espionage: studies in trust and betrayal. Praeger, Westport
Shaw ED, Fischer LF, Rose AE (2009) Insider risk evaluation and audit (No. Technical Report 09-02). Defense Personnel Security Research Center, Monterey
Sterman J (2000) Business dynamics: systems thinking and modeling for a complex world. Irwin/McGraw-Hill, New York
U.S. GAO (2015) Insider threats: DOD should strengthen management and guidance to protect classified systems (No. GAO-15-544). United States Government Accountability Office
Acknowledgments
This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Moore, A.P., Kennedy, K.A. & Dover, T.J. Introduction to the special issue on insider threat modeling and simulation. Comput Math Organ Theory 22, 261–272 (2016). https://doi.org/10.1007/s10588-016-9210-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10588-016-9210-8