Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458362 | Digital Investigation | 2006 | 12 Pages |
Abstract
This article reviews recent empirical evidence garnered from inductive studies of insiders examining "who, what, where, when, why and how" of insider computer attacks. These results are then compared to insider "theories" and folklore. Then the use of a specific deductive profiling approach to insider investigation and case management is described along with illustrative case studies. The overall role of the behavioral consultant in insider cases is examined with emphasis on specific forms of support for the investigative team and aid to managers and security personnel with case management of insiders within corporate environments.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Eric D. Shaw,