Efficient Generation of Social Network Data from ComputerMediated Communication Logs

Sung Yee, Jason W

ISBN 10: 1288369824 ISBN 13: 9781288369829
Editorial: Biblioscholar, 2012
Nuevos PAP

Librería: PBShop.store UK, Fairford, GLOS, Reino Unido Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Vendedor de AbeBooks desde 11 de junio de 1999

Este artículo en concreto ya no está disponible.

Descripción

Descripción:

New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de ref. del artículo L0-9781288369829

Denunciar este artículo

Sinopsis:

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented.

Reseña del editor: The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented.

"Sobre este título" puede pertenecer a otra edición de este libro.

Detalles bibliográficos

Título: Efficient Generation of Social Network Data ...
Editorial: Biblioscholar
Año de publicación: 2012
Encuadernación: PAP
Condición: New

Los mejores resultados en AbeBooks

Imagen de archivo

Sung Yee, Jason W.
Publicado por BiblioScholar, 2012
ISBN 10: 1288369824 ISBN 13: 9781288369829
Antiguo o usado Paperback

Librería: Mispah books, Redhill, SURRE, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA79612883698246

Contactar al vendedor

Comprar usado

EUR 101,23
Convertir moneda
Gastos de envío: EUR 28,91
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito