Abstract
The authors propose a new approach to the mathematical interpretation to overcome the problems associate with the identification (detect) of the unauthorized acquisition (intentional and accidental) of information by insiders within an enterprise of any industry. The approach is based on the use of mathematical tools based on integer programming. Secondly, the practical implementation of this approach has suggested that this approach has possible uses for applied software or as part of analytical tool to detect high risk behavior. This new approach can be using in complex problems with other tools or applications for detection of insiders within different enterprises. The authors propose a new approach that can be used as a tool within complex enterprises to increase the accuracy of detecting unauthorized activities of insiders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vereen, V.: Economic crimes, p. 215. Delo, Moscow (2002)
Kavun, S.: Life cycle of economic security. Development Management 6, 17–21 (2008)
Kavun, S.: Insider – a threat to economic security. Development Management 6, 7–11 (2008)
Geyets, V.: The modeling of economic security: power, region, enterprise: monograph. In: Geyets, V., Kizim, M., Klebanova, T., Chernyak, O. (eds.), p. 240. INZHEK, KharkÑ–v (2006)
Gurov, M., Kudryavtsev, Y.: The shadow economy and economic crime in the questions and answers: Textbook, p. 237. Saint-Petersburg State University of MIA of Russia (2002)
Oleynikov, E.: Economic and national security: the textbook for high schools, p. 768. AM: Exam (2005)
Kurkin, N.: Managing the economic security of the enterprise: monograph. In: Kurkin, N. (ed.) p. 452. Art-Press, Dnepropetrovsk (2004)
Shkarlet, S.: The economic security of enterprise: innovation aspect: monograph. In: Shkarlet, S. (ed.), p. 436. Books view of the NAU, Kiev (2007)
Kavun, S.: Statistical analysis in area of economic and information security (and part 2). ES INFECO. International Research Portal Information and Economic Security (2011-2012), http://infeco.net
Computer Security Institute, 2007 CSI Computer Crime and Security Survey (2007), http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.pdf
Juran, J.M.: Juran’s Quality Control Handbook. McGraw-Hill (ASQC Quality Press), New York (1988)
Kavun, S.: Mathematical interpretation of the task of identifying insider in the organization (enterprise). In: Kavun, S., Sorbat, S. (eds.) Economic: Problems of Theory and Practice: BZ. Science Price 246, 862–869. Science Price, BZ (2008); At 5 parts. – Part IV. AUTHORITY, Dnepropetrovsk
Kavun, S.: Model of insiders in the company. In: Kavun, S., Sorbat, I. (eds.) Securitatea informaţională: ed. a 5-a jubiliară Conf. Intern. (April 16-17), p. 76. ASEM, Chişinău (2008)
Kavun, S.: Informational security: textbook. In: Kavun, S. (ed.), p. 368. Pub. of INZHEK, KharkÑ–v (2099)
Christofides, N.: Graph Theory. Algorithmic approach, p. 432. World, Moscow (1978); Trans. from English
Kavun, S.: Insiding – the problem of economic security in conditions of reforming the Ukrainian economy. In: Kavun, S., Sorbat, I. (eds.) Actual Questions with Problems of Economics: Science Magazine, vol. 4(94), pp. 91–97. National academy of management, Kiev (2009)
Gordon, L.A.: Economic aspects of information security: An emerging field of research. Information Systems Frontiers 8(5), 335–337 (2006), http://portal.acm.org/citation.cfm?id=1196620&dl=GUIDE&coll=GUIDE&CFID=35748673&CFTOKEN=37314539
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kavun, S.V., Sorbat, I.V., Kalashnikov, V.V. (2012). Enterprise Insider Detection as an Integer Programming Problem. In: Watada, J., Watanabe, T., Phillips-Wren, G., Howlett, R., Jain, L. (eds) Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29920-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-29920-9_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29919-3
Online ISBN: 978-3-642-29920-9
eBook Packages: EngineeringEngineering (R0)