Page 19 - ISCI’2017
P. 19
professionals, etc., from the designated areas of activity. Moreover, this method can be used to
demonstrate the importance and the relevance of the research results, and the conclusions and
recommendations drawn, for example, in order to select consultants (leaders) in this or that area of
scientific activities.
For the openness, the authors could show some possibilities of the research conducted by them
on the example of the information security, which was selected because of its global relevance. The
use of this method is based on the specifics of the queries’ language that is supported by all search
engines and the shape of the query. The results on the set of selected search engines were averaged
by a given time interval. Thereby, the dynamics of the study is achieved. The authors have shown, as
an example, some limited areas of interest for the interpretation of the developed method with the
help of graph theory to be able to use the known techniques of optimization and further analysis
(Kavun and Mikhalchuk, 2009). Thus, the scope of the developed method of Internet-analysis is
multi-faceted in its specificity and tolerance in limited areas of interest (Kavun, 2011).
The purpose of this work is to show the possibility of formalizing of the task of identifying
insiders (insider activity) in the company based on a new modified-criteria method and the
cartographic analysis. This type of analysis will allow one to visually estimate the current state of the
activity of the employee, will determine the allowable ranges exceeding the boundary values, will
analyze the trends of activity for a given period, and will take appropriate countermeasures to prevent
any losses (Kavun and Brumnik, 2013).
The analysis of the open sources by Murdoch, 2001; Johnson, 2008; Kavun and Brumnik,
2013 has confirmed the lack of a common interpretation of the mathematical task of insiders (or their
activity) identification in the study of different authors. Thus, the task of identifying the insiders (or
their activity) can have reduced to the problems, which are non-interpretable, the classification of
which is based on the original authors’ research.
Thus, the criteria method (criteria method, CRIM) for identifying insiders or their activity was
developed by the authors. The CRIM is based on the use of a set of indicators (or their reasons) – set
{pi} i=1÷35 (Kavun and Brumnik, 2013). The insider activity often lead to financial losses (Kavun,
Sorbat and Kalashnikov, 2012), hence the need to solve this task of prevention (or/and forecasting),
or identifying insiders or insiders group (insider activity) at an early stage. The authors are proposing
three methods of identifying insiders (Kavun and Sorbat, 2012): the Matrix method (ММ), the Base
criteria method (CRIM), and the Modified criteria method (МCRIM).
19