Page 19 - ISCI’2017
P. 19

professionals, etc.,  from  the designated areas of  activity.  Moreover,  this  method can be used  to

            demonstrate  the  importance and the relevance of  the  research  results, and the  conclusions  and
            recommendations drawn, for example, in order to select consultants (leaders) in this or that area of

            scientific activities.
                   For the openness, the authors could show some possibilities of the research conducted by them

            on the example of the information security, which was selected because of its global relevance. The
            use of this method is based on the specifics of the queries’ language that is supported by all search

            engines and the shape of the query. The results on the set of selected search engines were averaged

            by a given time interval. Thereby, the dynamics of the study is achieved. The authors have shown, as
            an example, some limited areas of interest for the interpretation of the developed method with the

            help of graph theory to be able to use the known techniques of optimization and further analysis
            (Kavun and Mikhalchuk,  2009). Thus, the scope of the developed  method of  Internet-analysis is

            multi-faceted in its specificity and tolerance in limited areas of interest (Kavun, 2011).
                   The purpose of this work is to show the possibility of formalizing of the task of identifying

            insiders (insider activity)  in the company  based on  a new  modified-criteria  method and  the

            cartographic analysis. This type of analysis will allow one to visually estimate the current state of the
            activity of the employee, will determine the allowable ranges exceeding the boundary values, will

            analyze the trends of activity for a given period, and will take appropriate countermeasures to prevent

            any losses (Kavun and Brumnik, 2013).
                   The analysis of the open sources by Murdoch, 2001; Johnson, 2008; Kavun and Brumnik,

            2013 has confirmed the lack of a common interpretation of the mathematical task of insiders (or their
            activity) identification in the study of different authors. Thus, the task of identifying the insiders (or

            their activity) can have reduced to the problems, which are non-interpretable, the classification of
            which is based on the original authors’ research.

                   Thus, the criteria method (criteria method, CRIM) for identifying insiders or their activity was

            developed by the authors. The CRIM is based on the use of a set of indicators (or their reasons) – set
            {pi} i=1÷35 (Kavun and Brumnik, 2013). The insider activity often lead to financial losses (Kavun,

            Sorbat and Kalashnikov, 2012), hence the need to solve this task of prevention (or/and forecasting),
            or identifying insiders or insiders group (insider activity) at an early stage. The authors are proposing

            three methods of identifying insiders (Kavun and Sorbat, 2012): the Matrix method (ММ), the Base
            criteria method (CRIM), and the Modified criteria method (МCRIM).











                                                                                                          19
   14   15   16   17   18   19   20   21   22   23   24