-
1
-
-
76649107801
-
The insider threat
-
Aldhizer, G. (2007), “The insider threat”, Internal Auditor, Vol. 65 No. 2, pp. 71-3.
-
(2007)
Internal Auditor
, vol.65
, Issue.2
, pp. 71-73
-
-
Aldhizer, G.1
-
2
-
-
0036741938
-
Sabotage in the workplace: the role of organizational injustice
-
Ambrose, M., Seabright, M. and Schminke, M. (2000), “Sabotage in the workplace: the role of organizational injustice”, Organizational Behavior and Human Decision Processes, Vol. 89 No. 1, pp. 947-66.
-
(2000)
Organizational Behavior and Human Decision Processes
, vol.89
, Issue.1
, pp. 947-966
-
-
Ambrose, M.1
Seabright, M.2
Schminke, M.3
-
3
-
-
70149090395
-
-
Defense Personnel Security Research Center Monterey, CA
-
Band, S., Cappelli, D., Moore, A. and Shaw, E. (2006), Comparing Insider Sabotage and Espionage: A Model-Based Analysis, Defense Personnel Security Research Center, Monterey, CA.
-
(2006)
Comparing Insider Sabotage and Espionage: A Model-Based Analysis
-
-
Band, S.1
Cappelli, D.2
Moore, A.3
Shaw, E.4
-
4
-
-
54749105281
-
-
McGraw-Hill New York, NY
-
Barton, L. (2008), Crisis Leadership Now: A Real World Guide to Preparing for Threats, Disaster, Sabotage, and Scandal, McGraw-Hill, New York, NY.
-
(2008)
Crisis Leadership Now: A Real World Guide to Preparing for Threats, Disaster, Sabotage, and Scandal
-
-
Barton, L.1
-
5
-
-
35949002871
-
Main and moderating effects of self-control, organizational justice, and emotional labor on counterproductive behavior at work
-
Bechtoldt, M., Welk, C., Hartig, J. and Zapf, D. (2007), “Main and moderating effects of self-control, organizational justice, and emotional labor on counterproductive behavior at work”, European Journal of Work and Organizational Psychology, Vol. 16 No. 4, pp. 479-500.
-
(2007)
European Journal of Work and Organizational Psychology
, vol.16
, Issue.4
, pp. 479-500
-
-
Bechtoldt, M.1
Welk, C.2
Hartig, J.3
Zapf, D.4
-
6
-
-
24144458931
-
Information systems security from a knowledge management perspective
-
Belsis, P., Kokolakis, S. and Kiountouzis, E. (2005), “Information systems security from a knowledge management perspective”, Information Management & Computer Security, Vol. 13 No. 3, pp. 189-202.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.3
, pp. 189-202
-
-
Belsis, P.1
Kokolakis, S.2
Kiountouzis, E.3
-
7
-
-
0035579386
-
Predictors of employee deviance: the relationship between bad attitudes and bad behaviors
-
Bolin, A. and Heatherly, L. (2001), “Predictors of employee deviance: the relationship between bad attitudes and bad behaviors”, Journal of Business and Psychology, Vol. 15 No. 3, pp. 405-18.
-
(2001)
Journal of Business and Psychology
, vol.15
, Issue.3
, pp. 405-418
-
-
Bolin, A.1
Heatherly, L.2
-
8
-
-
84886931577
-
Management and education of the risk of insider threat (MERIT)
-
Cappelli, D., Desai, A., Moore, A., Shimeall, T., Weaver, E. and Willke, B. (2006), “Management and education of the risk of insider threat (MERIT)”, Proceedings of the 24th International Systems Dynamics Conference, Nijmegen, The Netherlands.
-
(2006)
Proceedings of the 24th International Systems Dynamics Conference, Nijmegen, The Netherlands
-
-
Cappelli, D.1
Desai, A.2
Moore, A.3
Shimeall, T.4
Weaver, E.5
Willke, B.6
-
10
-
-
30844454018
-
Uncovering the relationship between workplace destructive and constructive behaviors: an exploratory study
-
Galperin, B. and Burke, R. (2006), “Uncovering the relationship between workplace destructive and constructive behaviors: an exploratory study”, International Journal of Human Resource Management, Vol. 17 No. 2, pp. 331-47.
-
(2006)
International Journal of Human Resource Management
, vol.17
, Issue.2
, pp. 331-347
-
-
Galperin, B.1
Burke, R.2
-
11
-
-
0037203599
-
HP's Superdome sabotaged by ex-employee
-
Gengler, B. (2002), “HP's Superdome sabotaged by ex-employee”, Computer Fraud & Security, Vol. 2 No. 1, pp. 5-6.
-
(2002)
Computer Fraud & Security
, vol.2
, Issue.1
, pp. 5-6
-
-
Gengler, B.1
-
12
-
-
76649143965
-
Three year jail sentence for Carillion worker
-
Gerrard, N. (2008), “Three year jail sentence for Carillion worker”, Contract Journal, Vol. 44 No. 3, p. 39.
-
(2008)
Contract Journal
, vol.44
, Issue.3
, pp. 39
-
-
Gerrard, N.1
-
13
-
-
0001021040
-
Reasons for employee sabotage in the workplace
-
Giacalone, R. (1987), “Reasons for employee sabotage in the workplace”, Journal of Business and Psychology, Vol. 1 No. 4, pp. 367-78.
-
(1987)
Journal of Business and Psychology
, vol.1
, Issue.4
, pp. 367-378
-
-
Giacalone, R.1
-
14
-
-
33644600194
-
Maturity model for IT outsourcing relationships
-
Gottschalk, P. and Solli, H. (2006), “Maturity model for IT outsourcing relationships”, Industrial Management & Data Systems, Vol. 106 No. 2, pp. 200-12.
-
(2006)
Industrial Management & Data Systems
, vol.106
, Issue.2
, pp. 200-212
-
-
Gottschalk, P.1
Solli, H.2
-
15
-
-
76649086251
-
Lost or stolen data: minimizing fallout
-
Granade, P. (2008), “Lost or stolen data: minimizing fallout”, Inside Counsel, Vol. 18 No. 2, p. 7.
-
(2008)
Inside Counsel
, vol.18
, Issue.2
, pp. 7
-
-
Granade, P.1
-
16
-
-
0003506109
-
-
5th ed., Prentice-Hall New York, NY
-
Hair, J., Anderson, R., Tatham, R. and Black, W. (1998), Multivariate Data Analysis, 5th ed., Prentice-Hall, New York, NY.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.1
Anderson, R.2
Tatham, R.3
Black, W.4
-
17
-
-
33846995502
-
-
Defense Personnel Security Research Center Monterey, CA
-
Herbig, K. and Wiskoff, M. (2002), Espionage Against the United States by American Citizens, 1947-2001, Defense Personnel Security Research Center, Monterey, CA.
-
(2002)
Espionage Against the United States by American Citizens, 1947-2001
-
-
Herbig, K.1
Wiskoff, M.2
-
18
-
-
34948857053
-
Usable set-up of runtime security policies
-
Herzog, A. and Shahmehri, N. (2007), “Usable set-up of runtime security policies”, Information Management & Computer Security, Vol. 15 No. 5, pp. 394-407.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 394-407
-
-
Herzog, A.1
Shahmehri, N.2
-
19
-
-
34548444057
-
Building an endpoint security arsenal
-
Isreal, R. (2007), “Building an endpoint security arsenal”, Health Management Technology, Vol. 28 No. 7, pp. 12-36.
-
(2007)
Health Management Technology
, vol.28
, Issue.7
, pp. 12-36
-
-
Isreal, R.1
-
20
-
-
76649112965
-
HMRC left the door open to data theft
-
Kamath, J. and Flinders, K. (2008), “HMRC left the door open to data theft”, Computer Weekly, Vol. 14 No. 28, pp. 6-7.
-
(2008)
Computer Weekly
, vol.14
, Issue.28
, pp. 6-7
-
-
Kamath, J.1
Flinders, K.2
-
21
-
-
0009083545
-
Perceived organizational climate and employee counterproductively
-
Kamp, J. and Brooks, P. (1991), “Perceived organizational climate and employee counterproductively”, Business and Psychology, Vol. 5 No. 4, pp. 447-58.
-
(1991)
Business and Psychology
, vol.5
, Issue.4
, pp. 447-458
-
-
Kamp, J.1
Brooks, P.2
-
22
-
-
2642567457
-
Will you survive the services revolution
-
Karmarkar, U. (2004), “Will you survive the services revolution”, Harvard Business Review, Vol. 82 No. 6, pp. 100-7.
-
(2004)
Harvard Business Review
, vol.82
, Issue.6
, pp. 100-107
-
-
Karmarkar, U.1
-
23
-
-
33644533141
-
Information security: management's effect on culture and policy
-
Knapp, K., Marshall, T., Rainer, K. and Ford, F. (2006), “Information security: management's effect on culture and policy”, Information Management & Computer Security, Vol. 14 No. 4, pp. 24-36.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.4
, pp. 24-36
-
-
Knapp, K.1
Marshall, T.2
Rainer, K.3
Ford, F.4
-
24
-
-
34548202158
-
Employee satisfaction and theft: testing climate perceptions as a mediator
-
Kulas, J., McInnerney, J., DeMuth, J. and Jadwinski, V. (2007), “Employee satisfaction and theft: testing climate perceptions as a mediator”, Journal of Psychology, Vol. 14 No. 1, pp. 389-402.
-
(2007)
Journal of Psychology
, vol.14
, Issue.1
, pp. 389-402
-
-
Kulas, J.1
McInnerney, J.2
DeMuth, J.3
Jadwinski, V.4
-
25
-
-
54949103238
-
Managed IT services: the role of IT standards
-
Kumbakara, N. (2008), “Managed IT services: the role of IT standards”, Information Management & Computer Security, Vol. 16 No. 4, pp. 336-59.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.4
, pp. 336-359
-
-
Kumbakara, N.1
-
26
-
-
76649095175
-
Endpoint security holes open a door for hackers
-
McAlearney, S. (2008), “Endpoint security holes open a door for hackers”, CIO Magazine, Vol. 21 No. 20, p. 13.
-
(2008)
CIO Magazine
, vol.21
, Issue.20
, pp. 13
-
-
McAlearney, S.1
-
27
-
-
76649110104
-
Case of insider sabotage at Omega Engineering
-
McCrea, A. (2008), “Case of insider sabotage at Omega Engineering”, Business Case Journal, Vol. 15 No. 1, pp. 61-73.
-
(2008)
Business Case Journal
, vol.15
, Issue.1
, pp. 61-73
-
-
McCrea, A.1
-
28
-
-
0016471408
-
Job satisfaction, counterproductive behavior, and drug use at work
-
Mangione, T. and Quinn, R. (1974), “Job satisfaction, counterproductive behavior, and drug use at work”, Journal of Applied Psychology, Vol. 60 No. 1, pp. 114-6.
-
(1974)
Journal of Applied Psychology
, vol.60
, Issue.1
, pp. 114-116
-
-
Mangione, T.1
Quinn, R.2
-
29
-
-
76649141931
-
Energy firms face upgrades
-
Messmer, E. (2007), “Energy firms face upgrades”, Network World, Vol. 24 No. 49, p. 12.
-
(2007)
Network World
, vol.24
, Issue.49
, pp. 12
-
-
Messmer, E.1
-
30
-
-
76649143284
-
The problem with paperless
-
Mirsky, S. (2008), “The problem with paperless”, Information Outlook, Vol. 12 No. 8, pp. 33-5.
-
(2008)
Information Outlook
, vol.12
, Issue.8
, pp. 33-35
-
-
Mirsky, S.1
-
31
-
-
76649101640
-
1st step in defending against thieves: don't hire them
-
Morrow, B. (2008), “1st step in defending against thieves: don't hire them”, Credit Union Journal, Vol. 12 No. 38, p. 8.
-
(2008)
Credit Union Journal
, vol.12
, Issue.38
, pp. 8
-
-
Morrow, B.1
-
32
-
-
76649123304
-
5 steps for stopping the insider threat
-
Neray, P. (2008), “5 steps for stopping the insider threat”, Wall Street and Technology, Vol. 26 No. 9, p. 32.
-
(2008)
Wall Street and Technology
, vol.26
, Issue.9
, pp. 32
-
-
Neray, P.1
-
33
-
-
0032332318
-
Workplace violence and workplace aggression: evidence concerning specific forms, potential causes, and preferred targets
-
Neuman, J. and Baron, R. (1998), “Workplace violence and workplace aggression: evidence concerning specific forms, potential causes, and preferred targets”, Journal of Management, Vol. 24 No. 3, pp. 391-419.
-
(1998)
Journal of Management
, vol.24
, Issue.3
, pp. 391-419
-
-
Neuman, J.1
Baron, R.2
-
34
-
-
39149109926
-
The relative correlates of organizational citizenship behavior and counterproductive work behavior using multiple scores of data
-
O'Brian, K. and Allen, T. (2008), “The relative correlates of organizational citizenship behavior and counterproductive work behavior using multiple scores of data”, Business and Psychology, Vol. 21 No. 1, pp. 62-88.
-
(2008)
Business and Psychology
, vol.21
, Issue.1
, pp. 62-88
-
-
O'Brian, K.1
Allen, T.2
-
35
-
-
76649085113
-
Means to an endpoint
-
Ohlhorst, F. (2007), “Means to an endpoint”, eWeek, Vol. 24 No. 39, pp. 1-4.
-
(2007)
eWeek
, vol.24
, Issue.39
, pp. 1-4
-
-
Ohlhorst, F.1
-
36
-
-
76649105975
-
The ‘dark side’ of self-monitoring: engaging in counterproductive work behaviors
-
Parks, L. and Mount, M. (2005), “The ‘dark side’ of self-monitoring: engaging in counterproductive work behaviors”, Proceedings of the 2005 Academy of Management Conference, Honolulu, HI, pp. 1-16.
-
(2005)
Proceedings of the 2005 Academy of Management Conference, Honolulu, HI
, pp. 1-16
-
-
Parks, L.1
Mount, M.2
-
37
-
-
76649104558
-
Security tightens for SMBs
-
Prince, B. (2008), “Security tightens for SMBs”, eWeek, Vol. 25 No. 14, p. 21.
-
(2008)
eWeek
, vol.25
, Issue.14
, pp. 21
-
-
Prince, B.1
-
38
-
-
49249127269
-
Information security management objectives and practices: a parsimonious framework
-
Qingxiong, M., Johnston, A. and Pearson, M. (2008), “Information security management objectives and practices: a parsimonious framework”, Information Management & Computer Security, Vol. 16 No. 3, pp. 251-70.
-
(2008)
Information Management & Computer Security
, vol.16
, Issue.3
, pp. 251-270
-
-
Qingxiong, M.1
Johnston, A.2
Pearson, M.3
-
39
-
-
0001782487
-
Workplace deviance: its definition, manifestations, and causes
-
Robinson, S. and Bennett, B. (1997), “Workplace deviance: its definition, manifestations, and causes”, In Research on Negotiation on in Organizations., Vol. 6, pp. 3-27.
-
(1997)
In Research on Negotiation on in Organizations.
, vol.6
, pp. 3-27
-
-
Robinson, S.1
Bennett, B.2
-
40
-
-
44149112352
-
Treating employees as a threat
-
Roemer, K. (2008), “Treating employees as a threat”, Network Security, Vol. 11 No. 5, pp. 9-11.
-
(2008)
Network Security
, vol.11
, Issue.5
, pp. 9-11
-
-
Roemer, K.1
-
41
-
-
76649111267
-
Security that's all business
-
Sarrel, M. (2008), “Security that's all business”, PC Magazine, Vol. 27 No. 4, p. 62.
-
(2008)
PC Magazine
, vol.27
, Issue.4
, pp. 62
-
-
Sarrel, M.1
-
42
-
-
40549137449
-
When explanation for layoffs are not enough: employer's integrity as a moderator of the relationship between informational justice and retaliation
-
Skarlicki, D., Barclay, L. and Pugh, D. (2008), “When explanation for layoffs are not enough: employer's integrity as a moderator of the relationship between informational justice and retaliation”, Journal of Occupational & Organizational Psychology, Vol. 81 No. 1, pp. 123-46.
-
(2008)
Journal of Occupational & Organizational Psychology
, vol.81
, Issue.1
, pp. 123-146
-
-
Skarlicki, D.1
Barclay, L.2
Pugh, D.3
-
43
-
-
0001526612
-
Relationships of organizational frustration with reported behavioral reactions employees
-
Spector, P. (1975), “Relationships of organizational frustration with reported behavioral reactions employees”, Journal of Applied Psychology, Vol. 60 No. 5, pp. 635-7.
-
(1975)
Journal of Applied Psychology
, vol.60
, Issue.5
, pp. 635-637
-
-
Spector, P.1
-
44
-
-
34247091938
-
A strategic modeling technique for information risk assessment
-
Subhas, M., Kumar, V. and Kumar, U. (2007), “A strategic modeling technique for information risk assessment”, Information Management & Computer Security, Vol. 15 No. 1, pp. 64-77.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.1
, pp. 64-77
-
-
Subhas, M.1
Kumar, V.2
Kumar, U.3
-
45
-
-
38349098488
-
The conflict-positive organization
-
Tjosvold, D. (2008), “The conflict-positive organization”, Journal of Organizational Behavior, Vol. 29 No. 1, pp. 19-28.
-
(2008)
Journal of Organizational Behavior
, vol.29
, Issue.1
, pp. 19-28
-
-
Tjosvold, D.1
-
46
-
-
84992990420
-
Will internet sabotage hit home
-
Washburn, F. (2008), “Will internet sabotage hit home”, PC Magazine, Vol. 27 No. 7, pp. 17-18.
-
(2008)
PC Magazine
, vol.27
, Issue.7
, pp. 17-18
-
-
Washburn, F.1
-
47
-
-
4243198165
-
Enemy at the gate: threats to information security
-
Whitman, M. (2003), “Enemy at the gate: threats to information security”, Communications of the ACM, Vol. 46 No. 8, pp. 91-5.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
-
48
-
-
76649088212
-
Five ways insiders exploit your network
-
Whitney, B. and Condon, T. (2008), “Five ways insiders exploit your network”, Network World, Vol. 25 No. 19, p. 25.
-
(2008)
Network World
, vol.25
, Issue.19
, pp. 25
-
-
Whitney, B.1
Condon, T.2
-
49
-
-
84992941980
-
The dynamics of human behavior
-
Jacob, B., Lefgren, L. and Moretti, E. (2007), “The dynamics of human behavior”, Journal of Human Resources, Vol. 42 No. 3, pp. 389-427.
-
(2007)
Journal of Human Resources
, vol.42
, Issue.3
, pp. 389-427
-
-
Jacob, B.1
Lefgren, L.2
Moretti, E.3
-
50
-
-
33846978980
-
-
Defense Personnel Security Research Center Monterey, CA
-
Kramer, L., Heuer, R. and Crawford, K. (2005), Technological, Social and Economic Trends that Are Increasing US Vulnerability, Defense Personnel Security Research Center, Monterey, CA.
-
(2005)
Technological, Social and Economic Trends that Are Increasing US Vulnerability
-
-
Kramer, L.1
Heuer, R.2
Crawford, K.3
-
51
-
-
76649094455
-
Analyzing organizational cyber threats
-
Moore, A. and Cappelli, D. (2005), “Analyzing organizational cyber threats”, Proceedings of the Workshop on System Dynamics of Physical and Social Systems for National Security, Chantilly, VA.
-
(2005)
Proceedings of the Workshop on System Dynamics of Physical and Social Systems for National Security, Chantilly, VA
-
-
Moore, A.1
Cappelli, D.2
-
52
-
-
38649139089
-
A needs-based model of reconciliation: satisfying the differential needs of victim and perpetrator
-
Schnabel, N. and Nadler, A. (2008), “A needs-based model of reconciliation: satisfying the differential needs of victim and perpetrator”, Journal of Personality and Social Psychology, Vol. 94 No. 1, pp. 116-32.
-
(2008)
Journal of Personality and Social Psychology
, vol.94
, Issue.1
, pp. 116-132
-
-
Schnabel, N.1
Nadler, A.2
-
53
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
|