Enterprise Insider Detection as an Integer Programming Problem

  • Sergii V. Kavun
  • Ivan V. Sorbat
  • Vyacheslav V. Kalashnikov
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 16)


The authors propose a new approach to the mathematical interpretation to overcome the problems associate with the identification (detect) of the unauthorized acquisition (intentional and accidental) of information by insiders within an enterprise of any industry. The approach is based on the use of mathematical tools based on integer programming. Secondly, the practical implementation of this approach has suggested that this approach has possible uses for applied software or as part of analytical tool to detect high risk behavior. This new approach can be using in complex problems with other tools or applications for detection of insiders within different enterprises. The authors propose a new approach that can be used as a tool within complex enterprises to increase the accuracy of detecting unauthorized activities of insiders.


Functional Structure Restricted Access Shadow Economy Information Leakage Economic Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Vereen, V.: Economic crimes, p. 215. Delo, Moscow (2002)Google Scholar
  2. 2.
    Kavun, S.: Life cycle of economic security. Development Management 6, 17–21 (2008)Google Scholar
  3. 3.
    Kavun, S.: Insider – a threat to economic security. Development Management 6, 7–11 (2008)Google Scholar
  4. 4.
    Geyets, V.: The modeling of economic security: power, region, enterprise: monograph. In: Geyets, V., Kizim, M., Klebanova, T., Chernyak, O. (eds.), p. 240. INZHEK, Kharkіv (2006)Google Scholar
  5. 5.
    Gurov, M., Kudryavtsev, Y.: The shadow economy and economic crime in the questions and answers: Textbook, p. 237. Saint-Petersburg State University of MIA of Russia (2002)Google Scholar
  6. 6.
    Oleynikov, E.: Economic and national security: the textbook for high schools, p. 768. AM: Exam (2005)Google Scholar
  7. 7.
    Kurkin, N.: Managing the economic security of the enterprise: monograph. In: Kurkin, N. (ed.) p. 452. Art-Press, Dnepropetrovsk (2004)Google Scholar
  8. 8.
    Shkarlet, S.: The economic security of enterprise: innovation aspect: monograph. In: Shkarlet, S. (ed.), p. 436. Books view of the NAU, Kiev (2007)Google Scholar
  9. 9.
    Kavun, S.: Statistical analysis in area of economic and information security (and part 2). ES INFECO. International Research Portal Information and Economic Security (2011-2012),
  10. 10.
    Computer Security Institute, 2007 CSI Computer Crime and Security Survey (2007),
  11. 11.
    Juran, J.M.: Juran’s Quality Control Handbook. McGraw-Hill (ASQC Quality Press), New York (1988)Google Scholar
  12. 12.
    Kavun, S.: Mathematical interpretation of the task of identifying insider in the organization (enterprise). In: Kavun, S., Sorbat, S. (eds.) Economic: Problems of Theory and Practice: BZ. Science Price 246, 862–869. Science Price, BZ (2008); At 5 parts. – Part IV. AUTHORITY, DnepropetrovskGoogle Scholar
  13. 13.
    Kavun, S.: Model of insiders in the company. In: Kavun, S., Sorbat, I. (eds.) Securitatea informaţională: ed. a 5-a jubiliară Conf. Intern. (April 16-17), p. 76. ASEM, Chişinău (2008)Google Scholar
  14. 14.
    Kavun, S.: Informational security: textbook. In: Kavun, S. (ed.), p. 368. Pub. of INZHEK, Kharkіv (2099)Google Scholar
  15. 15.
    Christofides, N.: Graph Theory. Algorithmic approach, p. 432. World, Moscow (1978); Trans. from EnglishGoogle Scholar
  16. 16.
    Kavun, S.: Insiding – the problem of economic security in conditions of reforming the Ukrainian economy. In: Kavun, S., Sorbat, I. (eds.) Actual Questions with Problems of Economics: Science Magazine, vol. 4(94), pp. 91–97. National academy of management, Kiev (2009)Google Scholar
  17. 17.
    Gordon, L.A.: Economic aspects of information security: An emerging field of research. Information Systems Frontiers 8(5), 335–337 (2006), CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sergii V. Kavun
    • 1
  • Ivan V. Sorbat
    • 1
  • Vyacheslav V. Kalashnikov
    • 2
    • 3
    • 4
  1. 1.KhNEUKharkivUkraine
  2. 2.ITESMMonterreyMexico
  3. 3.CEMI RASMoscowRussia
  4. 4.SumGUSumyUkraine

Personalised recommendations