Solutions for Insider Espionage Threats: A Methodology for Design and Development of Organizational Training

Date of Award


Document Type

Undergraduate Capstone Project

Degree Name

Master of Applied Science

Organizational Unit

University College, Security Management


Security Management

First Advisor

Sam Conn


Case study methodology, Espionage, Insider crimes, Qualitative research methodologies, Requirements analysis, Structured development life cycle methodologies


With a continued increase in global marketplace activities, all members of an organization must be educated regarding secure technology, namely threats from insider espionage. Organizations must develop specific security training against the threat of insider attacks. This author presents a capstone report of a qualitative investigation utilizing case studies to describe the various espionage crimes perpetrated by insiders. Based on findings and conclusions from the case studies and synthesis with the literature review, the author presents a deliverable useful to organizations with vulnerabilities to insider espionage. The primary deliverable in this report involves a methodology to elicit requirements from users to develop and implement a training program for organizations to use as a countermeasure to the threat of insider espionage.

Publication Statement

Copyright is held by the author. Permanently suppressed.

This document is currently not available here.