Solutions for Insider Espionage Threats: A Methodology for Design and Development of Organizational Training
Date of Award
Master of Applied Science
Case study methodology, Espionage, Insider crimes, Qualitative research methodologies, Requirements analysis, Structured development life cycle methodologies
With a continued increase in global marketplace activities, all members of an organization must be educated regarding secure technology, namely threats from insider espionage. Organizations must develop specific security training against the threat of insider attacks. This author presents a capstone report of a qualitative investigation utilizing case studies to describe the various espionage crimes perpetrated by insiders. Based on findings and conclusions from the case studies and synthesis with the literature review, the author presents a deliverable useful to organizations with vulnerabilities to insider espionage. The primary deliverable in this report involves a methodology to elicit requirements from users to develop and implement a training program for organizations to use as a countermeasure to the threat of insider espionage.
Lakos, Steve, "Solutions for Insider Espionage Threats: A Methodology for Design and Development of Organizational Training" (2010). University College: Security Management Capstones. 8.
Copyright is held by the author. Permanently suppressed.