-
2
-
-
77249129629
-
Fraud and related activity in connection with computers 18 U.S.
-
Fraud and related activity in connection with computers 18 U.S. Code Sec. 1030.
-
Code Sec.
, vol.1030
-
-
-
3
-
-
77249098227
-
Theft of criminal trade secrets 18 U.S.
-
Theft of criminal trade secrets 18 U.S. Code, pp. 1831-1839.
-
Code
, pp. 1831-1839
-
-
-
4
-
-
0002766026
-
Anger driven retaliation: Toward an understanding of impassioned conflict in organizations
-
K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds.,. Greenwich, CT: JAI Press
-
K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds., "Anger driven retaliation: Toward an understanding of impassioned conflict in organizations," in Research on Negotiations in Organizations. Greenwich, CT: JAI Press, 1999, vol.7.
-
(1999)
Research on Negotiations in Organizations
, vol.7
-
-
-
5
-
-
77249102476
-
An e-mail chain reaction
-
(National Section) Oct. 4, [Online]. Available
-
"An e-mail chain reaction," N.Y. Times (National Section) Oct. 4, 2007 [Online]. Available: http://www.nytimes.com/2007/10/04/us/04bsecure. html?ref=us
-
(2007)
N.Y. Times
-
-
-
7
-
-
84874933913
-
Research on mitigating the insider threat to information systems #2
-
Aug.
-
R. H. Anderson et al., Research on mitigating the insider threat to information systems #2. Proc.Workshop. RAND, CF-163-DARPA, Aug. 2000.
-
(2000)
Proc.Workshop. RAND, CF-163-DARPA
-
-
Anderson, R.H.1
-
8
-
-
85047685143
-
How employees respond to personal offense: The effects of blame attrribution, victim status, and offender status on revenge and reconciliation in theworkplace
-
K. Aquino, T. M. Tripp, and R. J. Bies, "How employees respond to personal offense: The effects of blame attrribution, victim status, and offender status on revenge and reconciliation in theworkplace," J. Appl. Psychol., vol.86, no.1, pp. 52-59, 2001.
-
(2001)
J. Appl. Psychol.
, vol.86
, Issue.1
, pp. 52-59
-
-
Aquino, K.1
Tripp, T.M.2
Bies, R.J.3
-
9
-
-
77249153587
-
-
Binney v. Banner (North Carolina Court of Appeals)
-
Binney v. Banner Therapy Products 631 S.E. 2d 848 (2006), 850 (North Carolina Court of Appeals).
-
(2006)
Therapy Products 631 S.E. 2d 848
, pp. 850
-
-
-
11
-
-
62849104685
-
Position: The insider is relative
-
[Online]. Available, Position Paper
-
M. Bishop, "Position: The insider is relative," in Proc. New Security Paradigms Workshop, 2005 [Online]. Available: http://nob.cs.ucdavis. edu/bishop/papers/2005-nspw-2, Position Paper
-
(2005)
Proc. New Security Paradigms Workshop
-
-
Bishop, M.1
-
14
-
-
77249155961
-
Developing an insider threat model using functional decomposition
-
St. Petersburg, Russia, Sep.
-
J. W. Butts, R. F. Mills, and R. O. Baldwin, "Developing an insider threat model using functional decomposition," in Proc. 2nd Int. Workshop Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-CNS), St. Petersburg, Russia, Sep. 2005.
-
(2005)
Proc. 2nd Int. Workshop Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-CNS)
-
-
Butts, J.W.1
Mills, R.F.2
Baldwin, R.O.3
-
15
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Yokohama, Japan, Jun. 28-July 1
-
R. Chinchani, A. Iyer, H. Ngo, and S. Upadhyaya, "Towards a theory of insider threat assessment," in Proc. 2005 Int. Conf. Dependable Systems and Networks, Yokohama, Japan, Jun. 28-July 1 2005, pp. 108-117.
-
(2005)
Proc. 2005 Int. Conf. Dependable Systems and Networks
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhyaya, S.4
-
17
-
-
33749645791
-
Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment
-
D. De Cremer, "Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment," American Psychological Association: Group Dynamics: Theory, Research and Practice, vol.10, no.3, pp. 220-232, 2006.
-
(2006)
American Psychological Association: Group Dynamics: Theory, Research and Practice
, vol.10
, Issue.3
, pp. 220-232
-
-
De Cremer, D.1
-
18
-
-
77249148746
-
-
Final Report of the Insider Threat Integrated Process Team. U.S. Department of Defense, Apr. 24, DoD Insider Threat Mitigation
-
Final Report of the Insider Threat Integrated Process Team. U.S. Department of Defense. Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence), Apr. 24, 2000, DoD Insider Threat Mitigation.
-
(2000)
Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)
-
-
-
19
-
-
79955398131
-
-
Inc. 274 F.3d 577, 582 n. 10, 1st Circ.
-
EF Cultural Travel BV v. Explorica, Inc. 274 F.3d 577, 582 n. 10 (1st Circ. 2001), .
-
(2001)
EF Cultural Travel BV V. Explorica
-
-
-
21
-
-
0043264403
-
Reconceptualizing organizational routines as a source of flexibility and change
-
Mar.
-
M. S. Feldman and B. T. Pentland, "Reconceptualizing organizational routines as a source of flexibility and change," Admin. Sci. Quart., vol.48, no.1, pp. 94-118, Mar. 2003.
-
(2003)
Admin. Sci. Quart.
, vol.48
, Issue.1
, pp. 94-118
-
-
Feldman, M.S.1
Pentland, B.T.2
-
22
-
-
77249122011
-
FBI spy who sold out to Russia did megaton damage
-
Jun. 19, [Online]. Available
-
B. Fenton, "FBI spy who sold out to Russia did megaton damage," The Telegraph Jun. 19, 2001 [Online]. Available: http://www.telegraph. co.uk/news/main.jhtml?xml=/news/2001/02/21/wspy21.xml
-
(2001)
The Telegraph
-
-
Fenton, B.1
-
23
-
-
77249118635
-
The Omega Files
-
Jun. 6. [Online]. Available
-
S. Gaudin, "The Omega Files," Network World Jun. 6, 2000 [Online]. Available: http://www.networkworld.com/research/2000/0626feat. html
-
(2000)
Network World
-
-
Gaudin, S.1
-
24
-
-
0002760919
-
Spotlight abuse, save profits
-
D. Harper, "Spotlight abuse, save profits," Industrial Distribution, vol.79, pp. 47-51, 1990.
-
(1990)
Industrial Distribution
, vol.79
, pp. 47-51
-
-
Harper, D.1
-
25
-
-
33244464085
-
Toward a threat model for storage systems
-
ACM
-
R. Hasen, S. Myagmar, A. J. Lee, and W. Yurcik, "Toward a threat model for storage systems," in Proc. 2005 ACM Workshop on Storage Security and Survivability (StorageSS'05), 2005, pp. 94-102, ACM.
-
(2005)
Proc. 2005 ACM Workshop on Storage Security and Survivability (StorageSS'05)
, pp. 94-102
-
-
Hasen, R.1
Myagmar, S.2
Lee, A.J.3
Yurcik, W.4
-
26
-
-
34248344588
-
Applying role based access control and genetic algorithms to insider threat detection
-
New York
-
N. Hu, P. G. Badford, and J. Liu, "Applying role based access control and genetic algorithms to insider threat detection," in Proc. 44th Annual Southeast Regional Conf. (ACM-SE 44),NewYork, 2006, pp. 790-791.
-
(2006)
Proc. 44th Annual Southeast Regional Conf. (ACM-SE 44)
, pp. 790-791
-
-
Hu, N.1
Badford, P.G.2
Liu, J.3
-
27
-
-
77249142747
-
Tax suspects guidance on software left D.C. at risk
-
Jun. 10
-
D. Keating, "Tax suspects guidance on software left D.C. at risk," Washington Post, p. A01, Jun. 10, 2008.
-
(2008)
Washington Post
-
-
Keating, D.1
-
28
-
-
27844543023
-
-
May
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers, Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. U.S. Secret Service and CERT Coordination Center/SEI, May 2005.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. U.S. Secret Service and CERT Coordination Center/SEI
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
29
-
-
0027634119
-
An investigation of the Therac-25 accidents
-
Jul.
-
N. Leveson and C. Turner, "An investigation of the Therac-25 accidents," IEEE Computer, vol.26, no.7, pp. 18-41, Jul. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.7
, pp. 18-41
-
-
Leveson, N.1
Turner, C.2
-
30
-
-
77249110218
-
Security bulletin problem creates message flood
-
(National Section) Oct. 4, [Online]. Available
-
E. Lipton, "Security bulletin problem creates message flood," New York Times (National Section) Oct. 4, 2007 [Online]. Available: http://www. nytimes.com/2007/10/04/us/04bsecure.html?ref=us
-
(2007)
New York Times
-
-
Lipton, E.1
-
31
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of IT misuse," Comput. Security, vol.21, no.1, pp. 62-73, 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
32
-
-
0002038446
-
Toward a theory of workplace violence: A cognitive appraisal perspective
-
R. W. Griffin, A. O'Leary-Kelly, and J. M. Collins, Eds. Greenwich, CT: JAI Press
-
M. J. Martinko and K. L. Zellars, "Toward a theory of workplace violence: A cognitive appraisal perspective," in Dysfunctional Behavior in Organizations: Violent and Deviant Behavior, R. W. Griffin, A. O'Leary-Kelly, and J. M. Collins, Eds. Greenwich, CT: JAI Press, 1998, pp. 1-42.
-
(1998)
Dysfunctional Behavior in Organizations: Violent and Deviant Behavior
, pp. 1-42
-
-
Martinko, M.J.1
Zellars, K.L.2
-
33
-
-
33750261074
-
A system dynamic model of an insider attack on an information system
-
J. J. Gonsalez, Ed. Kristiansand, Norway: Norwegian Academic Press
-
C. Melara, J. M. Sarriegui, J. Gonsalez, A. Sawicka, and D. Cook, "A system dynamic model of an insider attack on an information system," in From Modeling to Managing Security: A System Dynamics Approach, J. J. Gonsalez, Ed. Kristiansand, Norway: Norwegian Academic Press, 2003.
-
(2003)
From Modeling to Managing Security: A System Dynamics Approach
-
-
Melara, C.1
Sarriegui, J.M.2
Gonsalez, J.3
Sawicka, A.4
Cook, D.5
-
34
-
-
3142684053
-
The challenges of insider misuse
-
SRI Computer Science Laboratory. Paper Prepared for the, Santa Monica, Aug. 16-18, [Online]. Available, RAND
-
P. G. Neumann, "The challenges of insider misuse," in SRI Computer Science Laboratory. Paper Prepared for the Workshop on Preventing, Detecting, and Responding to Malicious Insider Abuse, Santa Monica, Aug. 16-18, 1999, p. 3 [Online]. Available: http://www.csl.sri.com/ users/neumann/pgn- misuse.html, RAND
-
(1999)
Workshop on Preventing, Detecting, and Responding to Malicious Insider Abuse
, pp. 3
-
-
Neumann, P.G.1
-
35
-
-
77249173674
-
Silicon Valley a hotbed of economic espionage?
-
Sep. 29. [Online]. Available
-
K. Oanh Ha, "Silicon Valley a hotbed of economic espionage?," Oakland Tribune, MEDIANEWS Sep. 29, 2006 [Online]. Available: http://findarticles.com/p/articles/mi-qn4176/is-20060929/ ai-n16764129/pg-1
-
(2006)
Oakland Tribune, MEDIANEWS
-
-
Oanh Ha, K.1
-
36
-
-
4143075845
-
Composite role-based monitoring (CRBM) for countering insider threats
-
Tucson, AZ, Jun.
-
J. S. Park and S. M. Ho, "Composite role-based monitoring (CRBM) for countering insider threats," in Symp. Intelligence and Security Informatics, Tucson, AZ, Jun. 2004.
-
(2004)
Symp. Intelligence and Security Informatics
-
-
Park, J.S.1
Ho, S.M.2
-
37
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
Tucson, AZ, Dec. 6-10
-
S. Pramanik, V. Sankaranarayanan, and S. Upadhyaya, "Security policies to mitigate insider threat in the document control domain," in Proc. 20th Ann. Security Applications Conf. (ACSAC'04), Tucson, AZ, Dec. 6-10, 2004, pp. 304-313.
-
(2004)
Proc. 20th Ann. Security Applications Conf. (ACSAC'04)
, pp. 304-313
-
-
Pramanik, S.1
Sankaranarayanan, V.2
Upadhyaya, S.3
-
38
-
-
0142246362
-
Latent errors and adverse organizational consequences: A conceptualization
-
Nov., Chichester
-
R. Ramanumam and P. S. Goodman, "Latent errors and adverse organizational consequences: A conceptualization," J. Organization Behavior, vol.24, no.7, pp. 815-831, Nov. 2003, Chichester.
-
(2003)
J. Organization Behavior
, vol.24
, Issue.7
, pp. 815-831
-
-
Ramanumam, R.1
Goodman, P.S.2
-
39
-
-
32644465248
-
-
U.S. Secret Service and CERT Coordination Center
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. U.S. Secret Service and CERT Coordination Center, 2004.
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
40
-
-
0002035396
-
Employees Behaving Badly: Dimensions, Determinants and Dilemmas in the Study ofWorkplace Deviance
-
C. L. Cooper and D. M. Rousseau, Eds. Hoboken, NJ: Wiley
-
S. L. Robinson and J. Greenberg, "Employees Behaving Badly: Dimensions, Determinants and Dilemmas in the Study ofWorkplace Deviance," in Trends in Organizational Behavior, C. L. Cooper and D. M. Rousseau, Eds. Hoboken, NJ: Wiley, 1998, vol.5, pp. 1-30.
-
(1998)
Trends in Organizational Behavior
, vol.5
, pp. 1-30
-
-
Robinson, S.L.1
Greenberg, J.2
-
43
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Oct.
-
E. E. Schultz, "A framework for understanding and predicting insider attacks," Comput. Security, vol.21, no.6, pp. 525-531, Oct. 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.6
, pp. 525-531
-
-
Schultz, E.E.1
-
45
-
-
84937868440
-
A framework of privacy shield in organizational information systems
-
Sydney, Australia, Jul. 11-13
-
G. Skinner, S. Han, and E. Chang, "A framework of privacy shield in organizational information systems," in IEEE Computer Society, Proc. Int. Conf. Mobile Businesses (ICMB'05), Sydney, Australia, Jul. 11-13, 2005.
-
(2005)
IEEE Computer Society, Proc. Int. Conf. Mobile Businesses (ICMB'05)
-
-
Skinner, G.1
Han, S.2
Chang, E.3
-
47
-
-
77249109232
-
Northern district of California
-
United States v., 06-cr-00424-JW. Indictment, Jun. 15
-
United States v. Lan Lee andYuefei Ge. Northern District of California, Case 5:06-cr-00424-JW, Indictment, Jun. 15, 2006.
-
(2006)
Case
, vol.5
-
-
Lee, L.1
Ge, Y.2
|