메뉴 건너뛰기




Volumn 469, Issue , 2009, Pages 1-21

Insider theft of intellectual property for business advantage: A preliminary model

Author keywords

[No Author keywords available]

Indexed keywords

CARNEGIE MELLON UNIVERSITY; CYBER-CRIMES; EMPIRICAL DATA; GROUP MODELING; PRELIMINARY MODEL; PROPRIETARY INFORMATION; SOFTWARE ENGINEERING INSTITUTES; SYSTEM DYNAMICS MODEL;

EID: 84887229257     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 3
    • 84887224107 scopus 로고    scopus 로고
    • Common Sense Guide to Prevention and Detection of Insider Threat
    • September)(3rd ed.).Software Engineering Institute, and CyLab of Carnegie Mesn
    • Cappelli, D. M., Moore, A. P., Trzeciak, R. F., & Shimeall, T. J. (September 2008). Common Sense Guide to Prevention and Detection of Insider Threat (3rd ed.). CERT Program, Software Engineering Institute, and CyLab of Carnegie Mellon.
    • (2008) CERT Program
    • Cappelli, D.M.1    Moore, A.P.2    Trzeciak, R.F.3    Shimeall, T.J.4
  • 5
    • 3042863345 scopus 로고    scopus 로고
    • The missing link in information security: Three dimensional profiling
    • Gudaitis, T. (1998). The missing link in information security: Three Dimensional Profiling" (Vol. 1). Cyber Psychology and Behavior.
    • (1998) Cyber Psychology and Behavior , vol.1
    • Gudaitis, T.1
  • 8
    • 62949166367 scopus 로고    scopus 로고
    • Vol. Insider Attack and Cyber Secruity: Beyond the Hacker). (S. Stolfo, S. M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, & S. W. Smith, Eds.) New York, NY: Springer Science+Business Media, LLC
    • Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures (Vol. Insider Attack and Cyber Secruity: Beyond the Hacker). (S. Stolfo, S. M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, & S. W. Smith, Eds.) New York, NY: Springer Science+Business Media, LLC.
    • (2008) The "Big Picture" of Insider IT Sabotage across U.S. Critical Infrastructures
    • Moore, A.P.1    Cappelli, D.M.2    Trzeciak, R.F.3
  • 10
  • 18
    • 84887250947 scopus 로고    scopus 로고
    • (3rd, Ed.) Thousand Oaks: Sage Publications
    • RAND. Yin, R. K. (2003). Case Study Research. (3rd, Ed.) Thousand Oaks: Sage Publications.
    • (2003) Case Study Research
    • Yin, R.A.N.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.