Data Mining of E-Mails to Support Periodic & Continuous Assurance Glen L. Gray California State University at Northridge Roger Debreceny University of.

Slides:



Advertisements
Similar presentations
Every student. every classroom. every day. February 13, 2008 Multi-Year Fiscal Sustainability Plan:
Advertisements

IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
04b | Manage Test Execution (2 of 2) Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
Data Mining As A Continuous Auditing Tool for “Soft Information”: A Research Question A Research Proposal By J. Donald Warren, Jr. Rutgers University Fifth.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
Roger S. Debreceny Shidler College of Business University of Hawai‘i at Mānoa Glen L. Gray College of Business & Economics California State University,
Dobrin / Keller / Weisser : Technical Communication in the Twenty-First Century. © 2008 Pearson Education. Upper Saddle River, NJ, All Rights Reserved.
August 15 click! 1 Basics Kitsap Regional Library.
A RESEARCH TAXONOMY: THE APPLICATION OF DATA MINING TO FRAUD DETECTION Glen L. Gray California State University at Northridge Roger Debreceny University.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
Hello Employee, Welcome to MStreamIT!
Query Health Business Working Group Kick-Off September 8, 2011.
Evaluating the transfer-promoting potential of ESOL materials Mark Andrew James Arizona State University / Sunshine.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
August 01, 2008 Performance Modeling John Meisenbacher, MasterCard Worldwide.
Marketing Ethics and Social Responsibility
The Coles Notes Approach to Effective Network Security Management Reporting Dave Millier.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
The Changing World of Endpoint Protection
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
5-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
A Quick Introduction. About TransferScape LLC Our Mission Increase the economic impact of new technology. Our Product RapidScreen, a web service to transform.
Understanding Use: Predicting Action on a message Laura A. Dabbish Jianwei Wang CSCI6800 Spring 2005.
ITGS Databases.
Chapter 18 Digital Communication: , Instant Messages, Blogs, and Wikis Strategies for Technical Communication in the Workplace Laura J. Gurak John.
Management ’06 : Best Practice & Compliance in the Public Sector Controlling the Inbox Dr Keith Nicholson Alfred McAlpine Business Services Information.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Josef Schauer Program Manager Previous version support.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Health and Consumers Health and Consumers NAS Network feedback on reference document "Objectives and Indicators" MANCP Network meeting FVO, Grange
Microsoft Expression Web 3 Expression Web Design Feature Web Design Basics.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Josef Schauer Program Manager Commerce Data Exchange.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Access Test Questions Test Date: 05/05/16. Chapter 1 (Lynda.com) Question 1 An access database uses five main components (database objects). Which is.
Dysfunction: Causes, Effects, and Solutions.
Information explosion 1.4X 44X Protect communications.
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing environment.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
FIN 590 help A Guide to career/Snaptutorial
WRITE MARKETING COPY and EXECUTE TARGETED S
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Rights Management Services (RMS)
FIN 590 RANK Education Your Life-- fin590rank.com ENV 340 STUDY.
FIN 590 RANK Lessons in Excellence-- fin590rank.com.
FIN 590 RANK Education for Service-- fin590rank.com.
FIN 590 Education for Service-- tutorialrank.com
WRITE MARKETING COPY and EXECUTE TARGETED S
Office 365 Security & Compliance: Exchange Online Protection
Presentation transcript:

Data Mining of s to Support Periodic & Continuous Assurance Glen L. Gray California State University at Northridge Roger Debreceny University of Hawai`i at Mānoa 5th Symposium on Information Systems Assurance Toronto: October 2007

In this Presentation Continuous monitoring of s – why? Technologies Social Network Analysis Text analysis Challenges Opportunities

Continuous Monitoring of s – Why? Increased focus on forensic approaches to auditing Increased interest in continuous assurance and monitoring of business processes s = Organization’s DNA Evidential matter on: Employee & management fraud (overrides) Compliance (e.g., HIPAA) Loss of intellectual property Corporate policies

Enron Archive Released by Federal Energy Regulatory Commission 500K s 151 Enron employees Cleaned version at Carnegie Mellon Relational DB version at USC eport.pdf eport.pdf

Mining Targets

Content Analysis

Key Word Queries Yes, people do say self-incriminating things in their s Fraud Corporate dysfunction Overwhelming false positives Need “smart” compound queries Good continuous auditing (CA) candidate Already scanning for spam, porn, etc.

Sender Deception -- Content Deceptive s include: Fewer first-person pronouns to dissociate themselves from their own words Fewer exclusive words, such as but and except, to indicate a less complex story More negative emotion words because of the sender’s underlying feeling of guilt More action verbs to, again, indicate a less complex story

Sender Deception -- Identification Writeprint features Lexical -- characters & words Function words Root words Syntactic -- sentences Structural -- paragraphs Content-specific

Sender Deception -- Identification Number of potential features unlimited Optimum number can vary by context and language Developing user profiles and comparing new s to profiles would be challenging for real-time CA

Temporal/Log Analysis

Volume & Velocity Volume = number of s a person sends and/or receives over a period of time. Velocity = how quickly the volume changes. Many external factors (e.g., vacations, seasonal activities, etc.) impact these numbers Need “rolling histogram”

Volume & Velocity Key issue -- determining the optimum time intervals to sample the data Continuous monitoring cannot be continuous in terms of sampling in real time Comparing hourly, daily, and even weekly volumes and velocities will result in many false positives Optimum time internal could vary by job title

Social Network Analysis

Social relationships as an undirected graph Importance of understanding relationships within the flow of exchanges

Social Network Analysis in s s semi-structured data sender primary recipient(s) copied recipient(s) date subject line Social groups and cliques CA = who doesn’t belong?

Thread Analysis – This? Time S R C C SR C C R C C S S R C C

Thread Analysis – Or this? Time S R C C S R R C S C R RS R

Integrating Content Analysis and Social Network Analysis

Challenges of Mining Textual Inconsistent use of abbreviations Misspelled words Smileys etc. etc. Replies, replies, and more replies… Inability to identify: Identities of participants Roles and responsibilities

What Enron s Show? People do say the darnest things What did he know and when did he know it? Verified numerous bodies of data mining research Content analysis Social network analysis

Tools Content monitoring eSoft Corporation’s ThreatWall Symantec’s Mail Security 8x00 Series Vericept Corporation’s Vericept Content 360º Reconnex Corporation’s iGuard Appliance InBoxer, Inc. Anti-Risk Appliance Social networks Microsoft SNARF Heer Vizter

Research Opportunities

Research Questions Role of monitoring in overall CA environment? Join SNA with examination of textual patterns. Link SNA with control environment Frauds/control overrides footprint? What cleaning is required for CA purposes? Privacy and policy issues? Lessons from existing commercial products?

Your Questions Thank You