<?xml version="1.0"?>
<mods xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mods="http://www.loc.gov/mods/v3" version="3.7" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-7.xsd">
  <titleInfo>
    <title>Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 Final Report Sp07</title>
  </titleInfo>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Lim, Jongmin</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Cho, Young</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Niedzinski, Peter</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Sanchez, Gerardo</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Soo, Jason</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Alton, William</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Holmes, Matt</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Choriki, Justin</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Jeong, Heeyeol</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Hyc, Daniel</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Malanowski, Mark</namePart>
  </name>
  <name>
    <role>
      <roleTerm type="text" authority="marcrelator" authorityURI="http://id.loc.gov/vocabulary/relators" valueURI="http://id.loc.gov/vocabulary/relators/cre">creator</roleTerm>
    </role>
    <namePart>Nadji, Yacin</namePart>
  </name>
  <abstract>The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.</abstract>
  <note type="provenance">Submitted by Ariel True (atrue@iit.edu) on 2011-04-06T14:32:51Z No. of bitstreams: 7 license_rdf: 22564 bytes, checksum: ff373f1ad387898ef8ba4f8bc9e37073 (MD5) license_text: 20904 bytes, checksum: e09bf99e64678e4285abf3ef3e05412d (MD5) Computer Misuse IPRO 311 Poster Sp07.pdf: 22518609 bytes, checksum: b75642599ef7cf2499b595822c7e362d (MD5) Computer Misuse IPRO 311 Midterm Report Sp07.pdf: 73139 bytes, checksum: 7bdc07ab511c0aac233c1d5117afb4ce (MD5) Computer Misuse IPRO 311 IPRO Day Presentation Sp07.pdf: 483489 bytes, checksum: 4af009c15ad28063535ff21479310997 (MD5) Computer Misuse IPRO 311 Final Report Sp07.pdf: 90164 bytes, checksum: 72b9e30525e097e3d8bcf9449aa87cd1 (MD5) Computer Misuse IPRO 311 Brochure Sp07.pdf: 139050 bytes, checksum: 50f0da71e7c06dbcb47ada629a02be1f (MD5)</note>
  <note type="provenance">Made available in DSpace on 2011-04-06T14:32:51Z (GMT). No. of bitstreams: 7 license_rdf: 22564 bytes, checksum: ff373f1ad387898ef8ba4f8bc9e37073 (MD5) license_text: 20904 bytes, checksum: e09bf99e64678e4285abf3ef3e05412d (MD5) Computer Misuse IPRO 311 Poster Sp07.pdf: 22518609 bytes, checksum: b75642599ef7cf2499b595822c7e362d (MD5) Computer Misuse IPRO 311 Midterm Report Sp07.pdf: 73139 bytes, checksum: 7bdc07ab511c0aac233c1d5117afb4ce (MD5) Computer Misuse IPRO 311 IPRO Day Presentation Sp07.pdf: 483489 bytes, checksum: 4af009c15ad28063535ff21479310997 (MD5) Computer Misuse IPRO 311 Final Report Sp07.pdf: 90164 bytes, checksum: 72b9e30525e097e3d8bcf9449aa87cd1 (MD5) Computer Misuse IPRO 311 Brochure Sp07.pdf: 139050 bytes, checksum: 50f0da71e7c06dbcb47ada629a02be1f (MD5) Previous issue date: 2007-05</note>
  <abstract>Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester</abstract>
  <originInfo>
    <dateCreated keyDate="yes">2007-05</dateCreated>
  </originInfo>
  <originInfo>
    <dateIssued>2007-05</dateIssued>
  </originInfo>
  <identifier type="hdl">http://hdl.handle.net/10560/1817</identifier>
  <language>
    <languageTerm type="code" authority="rfc3066">en</languageTerm>
  </language>
  <subject>
    <topic>David Grossman</topic>
  </subject>
  <subject>
    <topic>Nazli Goharian</topic>
  </subject>
  <subject>
    <topic>Computer Misuse</topic>
  </subject>
  <subject>
    <topic>Misuse Detection</topic>
  </subject>
  <subject>
    <topic>Virus Detection</topic>
  </subject>
  <typeOfResource authority="coar" valueURI="http://purl.org/coar/resource_type/c_18op">Project deliverable</typeOfResource>
  <physicalDescription>
    <digitalOrigin>born digital</digitalOrigin>
    <internetMediaType>application/pdf</internetMediaType>
  </physicalDescription>
  <accessCondition type="useAndReproduction" displayLabel="rightsstatements.org">In Copyright</accessCondition>
  <accessCondition type="useAndReproduction" displayLabel="rightsstatements.orgURI">http://rightsstatements.org/page/InC/1.0/</accessCondition>
  <accessCondition type="restrictionOnAccess">Open Access</accessCondition>
  <name type="corporate">
    <namePart>IPRO / Interprofessional Projects Program</namePart>
    <affiliation>Illinois Institute of Technology</affiliation>
    <role>
      <roleTerm type="text">Affiliated department</roleTerm>
    </role>
  </name>
</mods>
