Special Issue on Insider Threat Modeling and Simulation
• Collection
Publisher
Springer Science+Business Media
Topic or Tag
Abstract
This special issue of the journal Computational and Mathematical Organization Theory demonstrates the potential for modeling and simulation science to not only help understand the insider threat problem, but also to help test mitigation controls in a secure environment.
Collection Items
Introduction to the Special Issue on Insider Threat Modeling and Simulation
• Article
By Andrew P. Moore, Kirk A. Kennedy (Federal Bureau of Investigation), Thomas J. Dover (Federal Bureau of Investigation)
In this publication, the authors introduce the area of insider threat modeling and simulation generally, and discuss the range of methods used in the research papers of the Special Issue.
ReadAn Agent-Based Approach to Modeling Insider Threat
• Article
By John A. Sokolowski (Old Dominion University), Catherine M. Banks (Old Dominion University), Thomas J. Dover (Federal Bureau of Investigation)
In this paper, the authors describe the modeling of the potential of an organization to develop an insider threat given certain attributes of its culture.
ReadInadvertent Leaks: Exploration via Agent-Based Dynamic Network Simulation
• Article
By Kathleen Carley (Carnegie Mellon School of Computer Science), Geoff Morgan (Carnegie Mellon School of Computer Science)
In this paper, the authors describe the results of using their network model to simulate the flow of sensitive information in organizations.
ReadCompliance Signaling Games: Toward Modeling the Deterrence of Insider Threats
• Article
By William Casey, Jose A. Morales, Evan Wright, Quanyan Zhu (New York University), Bud Mishra (New York University)
In this paper, the authors analyze how the dynamics of compliance games illuminate the effectiveness or risks of an organizational policy.
ReadUsing Dynamic Models to Support Inferences of Insider Threat Risk
• Article
By Paul J. Sticha (Human Resources Research Organization), Elise T. Axelrad (Human Resources Research Organization)
In this paper, the authors present a system dynamics model that incorporates psychological factors to simulate the pathway to insider attack.
Read