Application or Case Based Reasoning System for Identifying Insiders Threat Behavior in Telecom: The Case of Ethio Telecom

dc.contributor.advisorMillion Meshesha (PhD)
dc.contributor.authorYohanse Halefom
dc.date.accessioned2025-08-05T00:20:30Z
dc.date.available2025-08-05T00:20:30Z
dc.date.issued2019-06
dc.description.abstractOn this research work the researcher has made an attempt on applying case-based reasoning system in depicting employee's behavior towards potential (fraud to be committed by identifying at risk employees and recommending possible related fraud types to be committed, by using human observable behaviors. The required knowledge was acquired from two group of experts, seven previously investigated insider cases, document analysis and other relevant information through a six-point Likert scale questionnaire survey. Investigated cases were gather from Ethio telecom legal department and information science department. The domain experts were selected from Addis Ababa University. FORE attorney general and self-employed personnel, using purposive sampling. For modeling purpose of the acquired knowledge, hierarchical tree modeling technique were used. Attributes that arc relevant and have direct impact on the decision were selected and the case structure formulated. The prototype is developed using the Object-Oriented framework JCOLIBRII . 1. The system has the capability in retrieving, reusing, revising, and retaining new cases. And here nearest neighbor retrieval algorithm was used while the system retrieves cases from the knowledge base. In order to assure the CBR system has meet the requirement needed, evaluation was conducted on both the system performance and user acceptance test. The overall evaluation result shows that the case based reasoning prototype for insider threat mitigation is very encouraging as the retrieval performance of the prototype registers an average value of 82. 14% precision and 82.85 % recall with average accuracy of 94.90%. And also, the system has registered an average grade of "very good" in user satisfaction test res ult. Generally, the work has achieved its objective by developing the expected prototype with an encouraging system performance and user acceptance test result on designing knowledge-based system for insider threat mitigation using human observable behaviors.
dc.identifier.urihttps://etd.aau.edu.et/handle/123456789/6041
dc.language.isoen
dc.publisherAddis Ababa University
dc.subjectThreat Behavior in Telecom: The Case of Ethio Telecom
dc.titleApplication or Case Based Reasoning System for Identifying Insiders Threat Behavior in Telecom: The Case of Ethio Telecom
dc.typeThesis

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Yohanes Halefom.pdf
Size:
18.13 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: