Search results
(1 - 6 of 6)
- Title
- Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 IPRO Day Presentation Sp07
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less
- Title
- Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 Brochure Sp07
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less
- Title
- Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 Final Report Sp07
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less
- Title
- Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 Poster Sp07
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less
- Title
- Misuse Detection (semester?), IPRO 311
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less
- Title
- Misuse Detection (semester?), IPRO 311: Computer Misuse IPRO 311 Midterm Report Sp07_redacted
- Creator
- Lim, Jongmin, Cho, Young, Niedzinski, Peter, Sanchez, Gerardo, Soo, Jason, Alton, William, Holmes, Matt, Choriki, Justin, Jeong, Heeyeol, Hyc, Daniel, Malanowski, Mark, Nadji, Yacin
- Date
- 2007-05, 2007-05
- Description
-
The main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a...
Show moreThe main problem the IPRO addressed was that of insider misuse. Contrary to popular belief, the largest threat facing companies on a technology level is not intrusion, but rather insider misuse. Insider misuse is a relatively new area of research in the field of Computer Science, which is one of the reasons it’s a relatively unheard of problem. In addition to that, due to intense media bias towards intrusion, people are blissfully unaware of the problem of insider misuse. Ethically, it’s an interesting problem. Companies already closely monitor user activity, but any infringement on perceived privacy in the workplace generally sends everyone flustering left and right. The IPRO had to personally evaluate if we felt the necessary invasion of privacy was worth the overall result which is a more secure and profitable business. Companies can decide which approach they would like to take, but it’s hard to believe that a company would choose one that wouldn’t help to prevent a loss of money.
Deliverables for IPRO 311: Misuse Detection for the Spring 2007 semester
Show less