Libros importados con hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Efficient Generation of Social Network Data from Computer-Mediated Communication Logs (in English)
Type
Physical Book
Publisher
Language
Inglés
Pages
88
Format
Paperback
Dimensions
24.6 x 18.9 x 0.5 cm
Weight
0.17 kg.
ISBN13
9781288369829
Categories

Efficient Generation of Social Network Data from Computer-Mediated Communication Logs (in English)

Jason W. Sung Yee (Author) · Biblioscholar · Paperback

Efficient Generation of Social Network Data from Computer-Mediated Communication Logs (in English) - Sung Yee, Jason W.

Physical Book

$ 48.80

$ 57.95

You save: $ 9.15

16% discount
  • Condition: New
It will be shipped from our warehouse between Monday, July 01 and Tuesday, July 02.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Efficient Generation of Social Network Data from Computer-Mediated Communication Logs (in English)"

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe those changes. Unfortunately, generation of social network data can be a time consuming and manually intensive process. This research discusses the automatic generation of such data from computer mediated communication records. Using the tools developed in this research, raw social network data can be gathered from communication logs quickly and cheaply. Ideas on further analysis of this data for insider threat mitigation are then presented.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews