search menu icon-carat-right cmu-wordmark

Inadvertent Leaks: Exploration via Agent-Based Dynamic Network Simulation

In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.

Springer Science+Business Media


This paper is part of a special issue of the journal Computational and Mathematical Organization Theory that demonstrates the potential for modeling and simulation science to not only help understand the insider threat problem, but also to help test mitigation controls in a secure environment.