Skip to main content

Enterprise Insider Detection as an Integer Programming Problem

  • Conference paper
Intelligent Decision Technologies

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 16))

Abstract

The authors propose a new approach to the mathematical interpretation to overcome the problems associate with the identification (detect) of the unauthorized acquisition (intentional and accidental) of information by insiders within an enterprise of any industry. The approach is based on the use of mathematical tools based on integer programming. Secondly, the practical implementation of this approach has suggested that this approach has possible uses for applied software or as part of analytical tool to detect high risk behavior. This new approach can be using in complex problems with other tools or applications for detection of insiders within different enterprises. The authors propose a new approach that can be used as a tool within complex enterprises to increase the accuracy of detecting unauthorized activities of insiders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vereen, V.: Economic crimes, p. 215. Delo, Moscow (2002)

    Google Scholar 

  2. Kavun, S.: Life cycle of economic security. Development Management 6, 17–21 (2008)

    Google Scholar 

  3. Kavun, S.: Insider – a threat to economic security. Development Management 6, 7–11 (2008)

    Google Scholar 

  4. Geyets, V.: The modeling of economic security: power, region, enterprise: monograph. In: Geyets, V., Kizim, M., Klebanova, T., Chernyak, O. (eds.), p. 240. INZHEK, KharkÑ–v (2006)

    Google Scholar 

  5. Gurov, M., Kudryavtsev, Y.: The shadow economy and economic crime in the questions and answers: Textbook, p. 237. Saint-Petersburg State University of MIA of Russia (2002)

    Google Scholar 

  6. Oleynikov, E.: Economic and national security: the textbook for high schools, p. 768. AM: Exam (2005)

    Google Scholar 

  7. Kurkin, N.: Managing the economic security of the enterprise: monograph. In: Kurkin, N. (ed.) p. 452. Art-Press, Dnepropetrovsk (2004)

    Google Scholar 

  8. Shkarlet, S.: The economic security of enterprise: innovation aspect: monograph. In: Shkarlet, S. (ed.), p. 436. Books view of the NAU, Kiev (2007)

    Google Scholar 

  9. Kavun, S.: Statistical analysis in area of economic and information security (and part 2). ES INFECO. International Research Portal Information and Economic Security (2011-2012), http://infeco.net

  10. Computer Security Institute, 2007 CSI Computer Crime and Security Survey (2007), http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.pdf

  11. Juran, J.M.: Juran’s Quality Control Handbook. McGraw-Hill (ASQC Quality Press), New York (1988)

    Google Scholar 

  12. Kavun, S.: Mathematical interpretation of the task of identifying insider in the organization (enterprise). In: Kavun, S., Sorbat, S. (eds.) Economic: Problems of Theory and Practice: BZ. Science Price 246, 862–869. Science Price, BZ (2008); At 5 parts. – Part IV. AUTHORITY, Dnepropetrovsk

    Google Scholar 

  13. Kavun, S.: Model of insiders in the company. In: Kavun, S., Sorbat, I. (eds.) Securitatea informaţională: ed. a 5-a jubiliară Conf. Intern. (April 16-17), p. 76. ASEM, Chişinău (2008)

    Google Scholar 

  14. Kavun, S.: Informational security: textbook. In: Kavun, S. (ed.), p. 368. Pub. of INZHEK, KharkÑ–v (2099)

    Google Scholar 

  15. Christofides, N.: Graph Theory. Algorithmic approach, p. 432. World, Moscow (1978); Trans. from English

    Google Scholar 

  16. Kavun, S.: Insiding – the problem of economic security in conditions of reforming the Ukrainian economy. In: Kavun, S., Sorbat, I. (eds.) Actual Questions with Problems of Economics: Science Magazine, vol. 4(94), pp. 91–97. National academy of management, Kiev (2009)

    Google Scholar 

  17. Gordon, L.A.: Economic aspects of information security: An emerging field of research. Information Systems Frontiers 8(5), 335–337 (2006), http://portal.acm.org/citation.cfm?id=1196620&dl=GUIDE&coll=GUIDE&CFID=35748673&CFTOKEN=37314539

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergii V. Kavun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kavun, S.V., Sorbat, I.V., Kalashnikov, V.V. (2012). Enterprise Insider Detection as an Integer Programming Problem. In: Watada, J., Watanabe, T., Phillips-Wren, G., Howlett, R., Jain, L. (eds) Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29920-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29920-9_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29919-3

  • Online ISBN: 978-3-642-29920-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics