Skip to main content

Conclusion to an Intelligent Agent as an Economic Insider Threat Solution: AIMIE

  • Conference paper
  • First Online:
Tackling Society's Grand Challenges with Design Science (DESRIST 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9661))

  • 1328 Accesses

Abstract

The design of solutions to problems in the information technology (IT) domain provides unique challenges. Many times the problem may not be solvable or presents phenomenological aspects. A well known IT problem is the insider threat. This unique threat is its position within the trusted boundary of an organization. They are behind the defenses put in place to keep the external attackers out. The insiders are those individuals that know the security processes and can easily circumvent these practices. Using Design Science research (DSR) allows for the exploration and iteration of possible solutions through design and scientific methods in parallel. This paper provides the findings of the intelligent agent research that was presented at the DESRIST 2015, where DSR created the Artificial Intelligent Memory Inference Engine (AIMIE). This research found that using already-in-place computing infrastructure for AIMIE’s architecture and Emergent Intelligence creates an economic tool for insider threat detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Blackwell, C.: Security architecture to protect against the insider threat from damage, fraud and theft. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, p. 45. ACM, April 2009

    Google Scholar 

  • Hevner, A., Chatterjee, S.: Design Research in Information Systems: Theory and Practice, vol. 22. Springer Science & Business Media, Heidelberg (2010)

    Google Scholar 

  • Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)

    Google Scholar 

  • Simon, H.A.: The Sciences of the Artificial, vol. 136. MIT Press, Cambridge (1996)

    Google Scholar 

  • Tagle, B.J.: Exploring an intelligent agent with the cognitive units using interred-based rules and linear genetic programming as an economic insider threat monitoring solution using design science research. Unpublished doctoral dissertation, Colorado Technical University, Colorado (2016)

    Google Scholar 

  • Tagle, B., Edwards, S.: Arabesque: software development process model for design science research (DRS Working Paper No. 513). Submitted to Conference the 50th Anniversary Design + Research + Society Conference, DRS 2016, Brighton, England, June 2016, pp. 27–30 (2015)

    Google Scholar 

  • Tagle, B., Felch, H.: Exploring an agent as an economic insider threat solution. In: At the Vanguard of Design Science: First Impressions and Early Findings from Ongoing Research Research-in-Progress Papers and Poster Presentations from the 10th International Conference, DESRIST 2015, Dublin, Ireland, 20–22 May 2015

    Google Scholar 

  • Tichy, W.F.: Should computer scientists experiment more? Computer 31(5), 32–40 (1998)

    Article  MathSciNet  Google Scholar 

  • Vaishnavi, V.K., Kuechler, W.: Design Science Research Methods and Patterns: Innovating Information and Communication Technology. CRC Press, Boca Raton (2015)

    Book  Google Scholar 

  • Venable, J.: The role of theory and theorising in design science research. In: Proceedings of the 1st International Conference on Design Science in Information Systems and Technology (DESRIST 2006), pp. 1–18, February 2006

    Google Scholar 

  • Wooldridge, M.: An Introduction to Multi-agent Systems. Wiley, Hoboken (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Betina Tagle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Tagle, B., Felch, H. (2016). Conclusion to an Intelligent Agent as an Economic Insider Threat Solution: AIMIE. In: Parsons, J., Tuunanen, T., Venable, J., Donnellan, B., Helfert, M., Kenneally, J. (eds) Tackling Society's Grand Challenges with Design Science. DESRIST 2016. Lecture Notes in Computer Science(), vol 9661. Springer, Cham. https://doi.org/10.1007/978-3-319-39294-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39294-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39293-6

  • Online ISBN: 978-3-319-39294-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics