메뉴 건너뛰기




Volumn 5, Issue 1, 2010, Pages 169-179

Insiders behaving badly: Addressing bad actors and their actions

Author keywords

Cyber crime; Cyber security; Insider threat

Indexed keywords

CYBER SECURITY; CYBER-CRIMES; HARD DRIVES; INSIDER THREAT; REAL EXAMPLE;

EID: 77249177144     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2009.2039591     Document Type: Article
Times cited : (75)

References (48)
  • 2
    • 77249129629 scopus 로고    scopus 로고
    • Fraud and related activity in connection with computers 18 U.S.
    • Fraud and related activity in connection with computers 18 U.S. Code Sec. 1030.
    • Code Sec. , vol.1030
  • 3
    • 77249098227 scopus 로고    scopus 로고
    • Theft of criminal trade secrets 18 U.S.
    • Theft of criminal trade secrets 18 U.S. Code, pp. 1831-1839.
    • Code , pp. 1831-1839
  • 4
    • 0002766026 scopus 로고    scopus 로고
    • Anger driven retaliation: Toward an understanding of impassioned conflict in organizations
    • K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds.,. Greenwich, CT: JAI Press
    • K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds., "Anger driven retaliation: Toward an understanding of impassioned conflict in organizations," in Research on Negotiations in Organizations. Greenwich, CT: JAI Press, 1999, vol.7.
    • (1999) Research on Negotiations in Organizations , vol.7
  • 5
    • 77249102476 scopus 로고    scopus 로고
    • An e-mail chain reaction
    • (National Section) Oct. 4, [Online]. Available
    • "An e-mail chain reaction," N.Y. Times (National Section) Oct. 4, 2007 [Online]. Available: http://www.nytimes.com/2007/10/04/us/04bsecure. html?ref=us
    • (2007) N.Y. Times
  • 7
    • 84874933913 scopus 로고    scopus 로고
    • Research on mitigating the insider threat to information systems #2
    • Aug.
    • R. H. Anderson et al., Research on mitigating the insider threat to information systems #2. Proc.Workshop. RAND, CF-163-DARPA, Aug. 2000.
    • (2000) Proc.Workshop. RAND, CF-163-DARPA
    • Anderson, R.H.1
  • 8
    • 85047685143 scopus 로고    scopus 로고
    • How employees respond to personal offense: The effects of blame attrribution, victim status, and offender status on revenge and reconciliation in theworkplace
    • K. Aquino, T. M. Tripp, and R. J. Bies, "How employees respond to personal offense: The effects of blame attrribution, victim status, and offender status on revenge and reconciliation in theworkplace," J. Appl. Psychol., vol.86, no.1, pp. 52-59, 2001.
    • (2001) J. Appl. Psychol. , vol.86 , Issue.1 , pp. 52-59
    • Aquino, K.1    Tripp, T.M.2    Bies, R.J.3
  • 9
    • 77249153587 scopus 로고    scopus 로고
    • Binney v. Banner (North Carolina Court of Appeals)
    • Binney v. Banner Therapy Products 631 S.E. 2d 848 (2006), 850 (North Carolina Court of Appeals).
    • (2006) Therapy Products 631 S.E. 2d 848 , pp. 850
  • 11
    • 62849104685 scopus 로고    scopus 로고
    • Position: The insider is relative
    • [Online]. Available, Position Paper
    • M. Bishop, "Position: The insider is relative," in Proc. New Security Paradigms Workshop, 2005 [Online]. Available: http://nob.cs.ucdavis. edu/bishop/papers/2005-nspw-2, Position Paper
    • (2005) Proc. New Security Paradigms Workshop
    • Bishop, M.1
  • 17
    • 33749645791 scopus 로고    scopus 로고
    • Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment
    • D. De Cremer, "Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment," American Psychological Association: Group Dynamics: Theory, Research and Practice, vol.10, no.3, pp. 220-232, 2006.
    • (2006) American Psychological Association: Group Dynamics: Theory, Research and Practice , vol.10 , Issue.3 , pp. 220-232
    • De Cremer, D.1
  • 19
    • 79955398131 scopus 로고    scopus 로고
    • Inc. 274 F.3d 577, 582 n. 10, 1st Circ.
    • EF Cultural Travel BV v. Explorica, Inc. 274 F.3d 577, 582 n. 10 (1st Circ. 2001), .
    • (2001) EF Cultural Travel BV V. Explorica
  • 21
    • 0043264403 scopus 로고    scopus 로고
    • Reconceptualizing organizational routines as a source of flexibility and change
    • Mar.
    • M. S. Feldman and B. T. Pentland, "Reconceptualizing organizational routines as a source of flexibility and change," Admin. Sci. Quart., vol.48, no.1, pp. 94-118, Mar. 2003.
    • (2003) Admin. Sci. Quart. , vol.48 , Issue.1 , pp. 94-118
    • Feldman, M.S.1    Pentland, B.T.2
  • 22
    • 77249122011 scopus 로고    scopus 로고
    • FBI spy who sold out to Russia did megaton damage
    • Jun. 19, [Online]. Available
    • B. Fenton, "FBI spy who sold out to Russia did megaton damage," The Telegraph Jun. 19, 2001 [Online]. Available: http://www.telegraph. co.uk/news/main.jhtml?xml=/news/2001/02/21/wspy21.xml
    • (2001) The Telegraph
    • Fenton, B.1
  • 23
    • 77249118635 scopus 로고    scopus 로고
    • The Omega Files
    • Jun. 6. [Online]. Available
    • S. Gaudin, "The Omega Files," Network World Jun. 6, 2000 [Online]. Available: http://www.networkworld.com/research/2000/0626feat. html
    • (2000) Network World
    • Gaudin, S.1
  • 24
    • 0002760919 scopus 로고
    • Spotlight abuse, save profits
    • D. Harper, "Spotlight abuse, save profits," Industrial Distribution, vol.79, pp. 47-51, 1990.
    • (1990) Industrial Distribution , vol.79 , pp. 47-51
    • Harper, D.1
  • 26
    • 34248344588 scopus 로고    scopus 로고
    • Applying role based access control and genetic algorithms to insider threat detection
    • New York
    • N. Hu, P. G. Badford, and J. Liu, "Applying role based access control and genetic algorithms to insider threat detection," in Proc. 44th Annual Southeast Regional Conf. (ACM-SE 44),NewYork, 2006, pp. 790-791.
    • (2006) Proc. 44th Annual Southeast Regional Conf. (ACM-SE 44) , pp. 790-791
    • Hu, N.1    Badford, P.G.2    Liu, J.3
  • 27
    • 77249142747 scopus 로고    scopus 로고
    • Tax suspects guidance on software left D.C. at risk
    • Jun. 10
    • D. Keating, "Tax suspects guidance on software left D.C. at risk," Washington Post, p. A01, Jun. 10, 2008.
    • (2008) Washington Post
    • Keating, D.1
  • 29
    • 0027634119 scopus 로고
    • An investigation of the Therac-25 accidents
    • Jul.
    • N. Leveson and C. Turner, "An investigation of the Therac-25 accidents," IEEE Computer, vol.26, no.7, pp. 18-41, Jul. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.7 , pp. 18-41
    • Leveson, N.1    Turner, C.2
  • 30
    • 77249110218 scopus 로고    scopus 로고
    • Security bulletin problem creates message flood
    • (National Section) Oct. 4, [Online]. Available
    • E. Lipton, "Security bulletin problem creates message flood," New York Times (National Section) Oct. 4, 2007 [Online]. Available: http://www. nytimes.com/2007/10/04/us/04bsecure.html?ref=us
    • (2007) New York Times
    • Lipton, E.1
  • 31
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of IT misuse," Comput. Security, vol.21, no.1, pp. 62-73, 2002.
    • (2002) Comput. Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 32
    • 0002038446 scopus 로고    scopus 로고
    • Toward a theory of workplace violence: A cognitive appraisal perspective
    • R. W. Griffin, A. O'Leary-Kelly, and J. M. Collins, Eds. Greenwich, CT: JAI Press
    • M. J. Martinko and K. L. Zellars, "Toward a theory of workplace violence: A cognitive appraisal perspective," in Dysfunctional Behavior in Organizations: Violent and Deviant Behavior, R. W. Griffin, A. O'Leary-Kelly, and J. M. Collins, Eds. Greenwich, CT: JAI Press, 1998, pp. 1-42.
    • (1998) Dysfunctional Behavior in Organizations: Violent and Deviant Behavior , pp. 1-42
    • Martinko, M.J.1    Zellars, K.L.2
  • 34
    • 3142684053 scopus 로고    scopus 로고
    • The challenges of insider misuse
    • SRI Computer Science Laboratory. Paper Prepared for the, Santa Monica, Aug. 16-18, [Online]. Available, RAND
    • P. G. Neumann, "The challenges of insider misuse," in SRI Computer Science Laboratory. Paper Prepared for the Workshop on Preventing, Detecting, and Responding to Malicious Insider Abuse, Santa Monica, Aug. 16-18, 1999, p. 3 [Online]. Available: http://www.csl.sri.com/ users/neumann/pgn- misuse.html, RAND
    • (1999) Workshop on Preventing, Detecting, and Responding to Malicious Insider Abuse , pp. 3
    • Neumann, P.G.1
  • 35
    • 77249173674 scopus 로고    scopus 로고
    • Silicon Valley a hotbed of economic espionage?
    • Sep. 29. [Online]. Available
    • K. Oanh Ha, "Silicon Valley a hotbed of economic espionage?," Oakland Tribune, MEDIANEWS Sep. 29, 2006 [Online]. Available: http://findarticles.com/p/articles/mi-qn4176/is-20060929/ ai-n16764129/pg-1
    • (2006) Oakland Tribune, MEDIANEWS
    • Oanh Ha, K.1
  • 36
    • 4143075845 scopus 로고    scopus 로고
    • Composite role-based monitoring (CRBM) for countering insider threats
    • Tucson, AZ, Jun.
    • J. S. Park and S. M. Ho, "Composite role-based monitoring (CRBM) for countering insider threats," in Symp. Intelligence and Security Informatics, Tucson, AZ, Jun. 2004.
    • (2004) Symp. Intelligence and Security Informatics
    • Park, J.S.1    Ho, S.M.2
  • 38
    • 0142246362 scopus 로고    scopus 로고
    • Latent errors and adverse organizational consequences: A conceptualization
    • Nov., Chichester
    • R. Ramanumam and P. S. Goodman, "Latent errors and adverse organizational consequences: A conceptualization," J. Organization Behavior, vol.24, no.7, pp. 815-831, Nov. 2003, Chichester.
    • (2003) J. Organization Behavior , vol.24 , Issue.7 , pp. 815-831
    • Ramanumam, R.1    Goodman, P.S.2
  • 40
    • 0002035396 scopus 로고    scopus 로고
    • Employees Behaving Badly: Dimensions, Determinants and Dilemmas in the Study ofWorkplace Deviance
    • C. L. Cooper and D. M. Rousseau, Eds. Hoboken, NJ: Wiley
    • S. L. Robinson and J. Greenberg, "Employees Behaving Badly: Dimensions, Determinants and Dilemmas in the Study ofWorkplace Deviance," in Trends in Organizational Behavior, C. L. Cooper and D. M. Rousseau, Eds. Hoboken, NJ: Wiley, 1998, vol.5, pp. 1-30.
    • (1998) Trends in Organizational Behavior , vol.5 , pp. 1-30
    • Robinson, S.L.1    Greenberg, J.2
  • 43
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Oct.
    • E. E. Schultz, "A framework for understanding and predicting insider attacks," Comput. Security, vol.21, no.6, pp. 525-531, Oct. 2002.
    • (2002) Comput. Security , vol.21 , Issue.6 , pp. 525-531
    • Schultz, E.E.1
  • 44
  • 47
    • 77249109232 scopus 로고    scopus 로고
    • Northern district of California
    • United States v., 06-cr-00424-JW. Indictment, Jun. 15
    • United States v. Lan Lee andYuefei Ge. Northern District of California, Case 5:06-cr-00424-JW, Indictment, Jun. 15, 2006.
    • (2006) Case , vol.5
    • Lee, L.1    Ge, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.