Skip to main content
Log in

Introduction to the special issue on insider threat modeling and simulation

  • Special Issue - Insider Threat
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  • Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston

    Google Scholar 

  • Carley KM (2002) Smart agents and organizations of the future. Handb New Media 12:206–220

    Google Scholar 

  • Carley KM (2003) Dynamic network analysis. Dynamic social network modeling and analysis: workshop summary and papers. Committee on Human Factors, National Research Council, Washington, pp 133–145

    Google Scholar 

  • Carley KM (2006) A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. DTIC Document

  • CERT Insider Threat Team (2013) Unintentional insider threats: a foundational study. Technical Report CMU/SEI-2013-TN-022, Software Engineering Institute, Pittsburgh

  • Cioffi-Revilla C (2014) Introduction to computational social science: principles and applications. Springer, London and Heidelberg

    Book  Google Scholar 

  • Cohen F (1999) Simulating cyber attacks, defences, and consequences. Comput Secur 18(6):479–518

    Article  Google Scholar 

  • Contractor NS, Monge PR, Leonardi PM (2011) Multidimensional networks and the dynamics of sociomateriality: bringing technology inside the network. Int J Commun 5:682–720

    Google Scholar 

  • Duran F, Conrad SH, Conrad GN, Duggan DP, Held EB (2009) Building a system for insider security. IEEE Secur Priv 6:30–38

    Article  Google Scholar 

  • Epstein JM, Axtell R (1996) Growing artificial societies: social science from the bottom up. Brookings Institution Press, Washington

    Google Scholar 

  • Freeman LC (2004) The development of social network analysis: a study in the sociology of science. Empirical Press, Vancouver

    Google Scholar 

  • Gilbert N (2008) Agent-based models. SAGE Publications Inc, New York

    Book  Google Scholar 

  • Gupta M, Rees J, Chaturvedi A, Chi J (2006) Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis Support Syst 41(3):592–603

    Article  Google Scholar 

  • Herbig KL (2008) Changes in Espionage by Americans, 1947–2007 (PERSEREC Technical Report No. 08-05). Defense Personnel and Security Research Center (PERSEREC). Retrieved from https://www.scribd.com/doc/192035027/Katherine-L-Herbig-Changes-in-Espionage-by-Americans-1947-2007-Technical-Report-08-05-Northrop-Grumman-March-2008

  • Hubbard DW (2009) The failure of risk management. Wiley, Hoboken

    Google Scholar 

  • INSA (2013) A preliminary examination of insider threat programs in the U.S. Private Sector. Intelligence and national security alliance. Retrieved from http://www.insaonline.org/i/d/a/b/InsiderThreat_embed.aspx

  • Kandias M, Mylonas A, Virvilis N, Theoharidou M, Gritzalis D (2010) An insider threat prediction model. In Katsikas S, Lopez J, Soriano M (eds) Trust, privacy and security in digital business. Springer, Berlin Heidelberg, p 26–37 Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-15152-1_3

  • Lanham MJ (2015) Rapid mission assurance assessment via sociotechnical modeling and simulation. Dissertations. Paper 536

  • Lanham MJ, Morgan GP, Carley KM (2011) Data-driven diffusion modeling to examine deterrence. In: IEEE presented at the network science workshop (NSW), 2011, p 1–8

  • Leonard R (2010) Von Neumann, Morgenstern, and the creation of game theory. Cambridge University Press, New York

    Book  Google Scholar 

  • Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE international presented at the requirements engineering conference, p 151–161

  • Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider-threat risks: a system dynamics approach. ACM Trans Model Comput Simul 18(2):7:1–7:27. doi:10.1145/1346325.1346328

    Article  Google Scholar 

  • Moore AP, Carley KM, Collins ML, Altman NW (2015) Social network dynamics of insider threats: a preliminary model. In: Proceedings of the international conference of the system dynamics society. System Dynamics Society, Boston

  • Moore AP, Novak WE, Collins ML, Trzeciak RF, Theis MC (2015b) Effective insider threat programs: understanding and avoiding potential pitfalls. Software Engineering Institute White Paper, Pittsburgh

    Google Scholar 

  • Moreno JL (1934) Who shall survive? A new approach to the problem of human interrelations. Nervous and Mental Disease Publishing Co., Beacon House

    Book  Google Scholar 

  • Myerson RB (1991) Game theory: analysis of conflict. Harvard University Press, Cambridge

    Google Scholar 

  • Neapolitan RE (1990) Probabilistic reasoning in expert systems: theory and algorithms. Wiley, New York

    Google Scholar 

  • Office of the Press Secretary (2011) Executive Order 13587—Structural reforms to improve the security of classified networks and the responsible sharing and safeguarding of classified information. The White House. https://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net

  • Pearl J (1985) Bayesian networks; a model of self-activated memory for evidential reasoning. In: Proceedings of the 7th Conference of the Cognitive Science Society, University of California, Irvine, p 329–334

  • Pearl J (1988) Probabilistic reasoning in intelligent systems. Morgan Kaufman, San Francisco

    Google Scholar 

  • Sarbin TR, Carney RM, Eoyang C (1994) Citizen Espionage: studies in trust and betrayal. Praeger, Westport

    Google Scholar 

  • Shaw ED, Fischer LF, Rose AE (2009) Insider risk evaluation and audit (No. Technical Report 09-02). Defense Personnel Security Research Center, Monterey

  • Sterman J (2000) Business dynamics: systems thinking and modeling for a complex world. Irwin/McGraw-Hill, New York

    Google Scholar 

  • U.S. GAO (2015) Insider threats: DOD should strengthen management and guidance to protect classified systems (No. GAO-15-544). United States Government Accountability Office

Download references

Acknowledgments

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew P. Moore.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moore, A.P., Kennedy, K.A. & Dover, T.J. Introduction to the special issue on insider threat modeling and simulation. Comput Math Organ Theory 22, 261–272 (2016). https://doi.org/10.1007/s10588-016-9210-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-016-9210-8

Keywords

Navigation