[CEUR Workshop Proceedings] Vol-469

Copyright © 2009 for the individual papers by the papers' authors. Copying permitted for private and academic purposes. Re-publication of material from this volume requires permission by the copyright owners. This volume is published by its editors.





MIST 2009
The 1st International Workshop on
Managing Insider Security Threats



Proceedings of the 1st MIST 2009 workshop
Purdue University, West Lafayette, USA, June 15-19, 2009.
(In Conjunction with IFIPTM 2009)


Edited by

David Chadwick *
Ilsun You +
Hang Bae Chang #

* The Computing Laboratory, University of Kent, UK
+ School of Information Science, Korean Bible University, South Korea
# Daejin University, South Korea




Table of Contents

Preface

  1. Insider Theft of Intellectual Property in Organizations: A Preliminary Model
    Andrew P. Moore, Dawn M. Cappelli, Thomas C. Caron, Eric Shaw
    and Randall F. Trzeciak
    , pages 1~21
  2. Insider Behavior: An Analysis of Decision under Risk
    Fariborz Farahmand and Eugene H. Spafford, pages 22~33
  3. Accumulating Evidence of Insider Attacks
    Howard Chivers, Philip Nobles, Siraj A. Shaikh, John A. Clark
    and Hao Chen
    , pages 34~50
  4. A Exploratory Study on R&D Strategies in Industrial Technology Security
    Hangbae Chang, Jonggu Kang, Hyukjun Kwon and Ilsun You, pages 51~61
  5. A Method to Evaluate Uncertain and Conflicting Trust and Authenticity Statements
    Andreas Gutscher, pages 62~82
  6. Manual vs. Automated Vulnerability Assessment: A Case Study
    James A. Kupsch and Barton P. Miller, pages 83~97



  7. ** Complete workshop proceedings as one file (about 1.9 MB)

15-Jun-2009: submitted by Ilsun You
15-Jun-2009: published on CEUR-WS.org