interface encompassing displays for high-level status as well as detailed monitoring.
In terms of areas for further research, Caputo posed the following questions:
What trade-offs associated with insider threat monitoring are there between the individual’s right to privacy and the organization’s need to protect its assets?
What are the implications of pre-interventional activities such as monitoring and the collection of data and predictive modeling? How might they affect morale or violate employee trust or legal guidelines? What is the potential for false accusations or misuse?
What is the impact of user profiling, and what are the ethical and legal issues surrounding this approach?
Finally, Caputo noted that research on the insider threat would be aided by good operational data samples.