Efficient Generation of Social Network Data from Computer-Mediated Communication Logs

Jason W. Sung Yee

ISBN 10: 1288369824 ISBN 13: 9781288369829
Editorial: Creative Media Partners, LLC Nov 2012, 2012
Nuevos Taschenbuch

Librería: AHA-BUCH GmbH, Einbeck, Alemania Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Vendedor de AbeBooks desde 14 de agosto de 2006

Este artículo en concreto ya no está disponible.

Descripción

Descripción:

Neuware - The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented. N° de ref. del artículo 9781288369829

Denunciar este artículo

Sinopsis:

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented.

Reseña del editor: The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented.

"Sobre este título" puede pertenecer a otra edición de este libro.

Detalles bibliográficos

Título: Efficient Generation of Social Network Data ...
Editorial: Creative Media Partners, LLC Nov 2012
Año de publicación: 2012
Encuadernación: Taschenbuch
Condición: Neu

Los mejores resultados en AbeBooks

Imagen de archivo

Sung Yee, Jason W.
Publicado por BiblioScholar, 2012
ISBN 10: 1288369824 ISBN 13: 9781288369829
Antiguo o usado Paperback

Librería: Mispah books, Redhill, SURRE, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA79612883698246

Contactar al vendedor

Comprar usado

EUR 101,23
Convertir moneda
Gastos de envío: EUR 28,91
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito