-
3
-
-
79955687068
-
-
RAND Corporation, Tech. Rep. RAND CF-151-OSD
-
R. H. Anderson, "Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems," RAND Corporation, Tech. Rep. RAND CF-151-OSD, 1999.
-
(1999)
Research and Development Initiatives Focused On Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems
-
-
Anderson, R.H.1
-
4
-
-
84874933913
-
-
RAND Corporation, Tech. Rep. RAND CF-163-DARPA
-
R. H. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. V. Wyk, "Research on mitigating the insider threat to information systems #2," RAND Corporation, Tech. Rep. RAND CF-163-DARPA, 2000.
-
(2000)
Research On Mitigating the Insider Threat to Information Systems #2
-
-
Anderson, R.H.1
Bozek, T.2
Longstaff, T.3
Meitzler, W.4
Skroch, M.5
Wyk, K.V.6
-
6
-
-
24644501524
-
-
US Department of Defense, Office of the Assistant Secretary of Defense (Command, Control, Commuications, and Intelligence). Available from, (last viewed March 2011)
-
"DoD Insider Threat Mitigation. Final Report of the Insider Threat Integrated Process Team." US Department of Defense, Office of the Assistant Secretary of Defense (Command, Control, Commuications, and Intelligence). Available from https://acc.dau.mil/CommunityBrowser.aspx?id=37478 (last viewed March 2011), 2000.
-
(2000)
DoD Insider Threat Mitigation. Final Report of the Insider Threat Integrated Process Team
-
-
-
7
-
-
36949007362
-
Challenging the anomaly detection paradigm: A provocative discussion
-
Schloss Dagstuhl, Germany. ACM Press, September, [Online]. Available
-
C. Gates and C. Taylor, "Challenging the anomaly detection paradigm: a provocative discussion," in Proc. of New Security Paradigms Workshop 2006 (NSPW'06), Schloss Dagstuhl, Germany. ACM Press, September 2007, pp. 21-29. [Online]. Available: http://doi.acm.org.globalproxy.cvt.dk/10.1145/1278940.1278945
-
(2007)
Proc. of New Security Paradigms Workshop 2006 (NSPW'06)
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
8
-
-
70149090395
-
-
Carnegie Mellon University, Tech. Rep. CMU/SEI-2006-TR-026
-
S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, and R. F. Trzeciak, "Comparing insider IT sabotage and espionage: A model-based analysis," Carnegie Mellon University, Tech. Rep. CMU/SEI-2006-TR-026, 2006.
-
(2006)
Comparing Insider it Sabotage and Espionage: A Model-based Analysis
-
-
Band, S.R.1
Cappelli, D.M.2
Fischer, L.F.3
Moore, A.P.4
Shaw, E.D.5
Trzeciak, R.F.6
-
9
-
-
84886884627
-
Countering insider threats
-
[Online]. Available
-
C. W. Probst, J. Hunker, M. Bishop, and D. Gollmann, "Countering insider threats," Dagstuhl Seminar Proceedings, 2008. [Online]. Available: http://drops.dagstuhl.de/opus/volltexte/2008/1793
-
(2008)
Dagstuhl Seminar Proceedings
-
-
Probst, C.W.1
Hunker, J.2
Bishop, M.3
Gollmann, D.4
-
10
-
-
84879725658
-
-
Springer
-
C. W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Aspects of Insider Threats. Springer, 2010, ch. in [44].
-
(2010)
Aspects of Insider Threats
, pp. 44
-
-
Probst, C.W.1
Hunker, J.2
Gollmann, D.3
Bishop, M.4
-
12
-
-
33745593513
-
The insider problem revisited
-
Lake Arrowhead, California, USA. ACM Press, September
-
M. Bishop, "The insider problem revisited," in Proc. of New Security Paradigms Workshop 2005 (NSPW'05), Lake Arrowhead, California, USA. ACM Press, September 2005, pp. 75-76.
-
(2005)
Proc. of New Security Paradigms Workshop 2005 (NSPW'05
, pp. 75-76
-
-
Bishop, M.1
-
14
-
-
38149091093
-
-
Master's thesis, Air Force Institute of Technology, available from, (last viewed March 2011)
-
V. Caruso, "Outsourcing information technology and the insider threat," Master's thesis, Air Force Institute of Technology, 2003, available from http://handle.dtic.mil/100.2/ADA415113 (last viewed March 2011).
-
(2003)
Outsourcing Information Technology and The Insider Threat
-
-
Caruso, V.1
-
15
-
-
33646886716
-
-
Available from, (last viewed March 2011)
-
N. Einwechter, "Preventing and detecting insider attacks using ids," Available from http://www.symantec.com/connect/articles/preventing-and-detecting-insider-attacks-using-ids (last viewed March 2011), 2002.
-
(2002)
Preventing and Detecting Insider Attacks Using Ids
-
-
Einwechter, N.1
-
17
-
-
63349109439
-
Case studies of an insider framework
-
Hawaii, USA, IEEE, January
-
M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates, "Case studies of an insider framework," in Proc. of the 42nd Hawaii International Conference on System Sciences (HICSS'09), Hawaii, USA. IEEE, January 2009, pp. 1-10.
-
(2009)
Proc. of the 42nd Hawaii International Conference On System Sciences (HICSS'09)
, pp. 1-10
-
-
Bishop, M.1
Engle, S.2
Peisert, S.3
Whalen, S.4
Gates, C.5
-
18
-
-
49249119924
-
Insiders behaving badly
-
July, [Online]. Available
-
J. Predd, S. L. Pfleeger, J. Hunker, and C. Bulford, "Insiders behaving badly," IEEE Security and Privacy, vol. 6, pp. 66-70, July 2008. [Online]. Available: http://portal.acm.org/citation.cfm?id=1441365.1441416
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 66-70
-
-
Predd, J.1
Pfleeger, S.L.2
Hunker, J.3
Bulford, C.4
-
19
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of it misuse
-
[Online]. Available
-
G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of it misuse," Computers & Security, vol. 21, no. 1, pp. 62-73, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-452D9TY-C/2/d3ce0be409d1fbb34d981e7f0cfecc13
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
20
-
-
84886892708
-
The risk of risk analysis and its relation to the economics of insider threats
-
T. Moore, D. Pym, and C. Ioannidis, Eds. Springer
-
C. W. Probst and J. Hunker, "The risk of risk analysis and its relation to the economics of insider threats," in Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis, Eds. Springer, 2010, pp. 279-299.
-
(2010)
Economics of Information Security and Privacy
, pp. 279-299
-
-
Probst, C.W.1
Hunker, J.2
-
27
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
Tucson, Arizona, USA. IEEE, December
-
S. Pramanik, V. Sankaranarayanan, and S. Upadhyaya, "Security policies to mitigate insider threat in the document control domain," in Proc of the 20th Annual Computer Security Applications Conference (ACSAC'04), Tucson, Arizona, USA. IEEE, December 2004, pp. 304-313.
-
(2004)
Proc of the 20th Annual Computer Security Applications Conference (ACSAC'04)
, pp. 304-313
-
-
Pramanik, S.1
Sankaranarayanan, V.2
Upadhyaya, S.3
-
28
-
-
84886890551
-
-
Springer
-
R. K. Iyer, P. Dabrowski, N. Nakka, and Z. Kalbarczyck, Preconfiguarable Tamper-resistant Hardware Support Against Insider Threats: The Tested ILLIAC Approach. Springer, 2008, ch. in [71].
-
(2008)
Preconfiguarable Tamper-resistant Hardware Support Against Insider Threats: The Tested ILLIAC Approach
, pp. 71
-
-
Iyer, R.K.1
Dabrowski, P.2
Nakka, N.3
Kalbarczyck, Z.4
-
29
-
-
38349036494
-
Elicit: A system for detecting insiders who violate need-to-know
-
Gold Goast, Australia, LNCS, Springer-Verlag, August
-
M. A. Maloof and G. D. Stephens, "Elicit: a system for detecting insiders who violate need-to-know," in Proc. of the 10th International Conference on Recent Advances in Intrusion Detection (RAID'07), Gold Goast, Australia, LNCS, vol. 4637. Springer-Verlag, August 2007, pp. 146-166.
-
(2007)
Proc. of the 10th International Conference On Recent Advances In Intrusion Detection (RAID'07)
, vol.4637
, pp. 146-166
-
-
Maloof, M.A.1
Stephens, G.D.2
-
30
-
-
84886935342
-
-
Springer
-
B. M. Bowen, M. B. Salem, A. D. Keromytis, and S. J. Stolfo, Monitoring Technologies for Mitigating Insider Threats. Springer, 2010, ch. in [44].
-
(2010)
Monitoring Technologies For Mitigating Insider Threats
, pp. 44
-
-
Bowen, B.M.1
Salem, M.B.2
Keromytis, A.D.3
Stolfo, S.J.4
-
34
-
-
84944727480
-
Honeypots: Catching the insider threat
-
Las Vegas, NV, USA, IEEE, December
-
L. Spitzner, "Honeypots: Catching the insider threat," in Proc. of the 19th Annual Computer Security Applications Conference (CSAC'03), Las Vegas, NV, USA. IEEE, December 2003, pp. 170-179.
-
(2003)
Proc. of the 19th Annual Computer Security Applications Conference (CSAC'03)
, pp. 170-179
-
-
Spitzner, L.1
-
35
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
[Online]. Available
-
M. Schonlau, W. DuMouchel, W. H. Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer Intrusion: Detecting Masquerades," Statistical Science, vol. 16, no. 1, pp. 58-74, 2001. [Online]. Available: http://dx.doi.org/10.2307/2676780
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
36
-
-
80052900980
-
-
The MITRE Corporation, Tech. Rep
-
M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matzner, T. Hetherington, B. Wood, C. Sibley, J. Marin, T. Longstaff, L. Spitzner, J. Haile, J. Copeland, and S. Lewandowski, "Analysis and detection of malicious insiders," The MITRE Corporation, Tech. Rep., 2005.
-
(2005)
Analysis and Detection of Malicious Insiders
-
-
Maybury, M.1
Chase, P.2
Cheikes, B.3
Brackney, D.4
Matzner, S.5
Hetherington, T.6
Wood, B.7
Sibley, C.8
Marin, J.9
Longstaff, T.10
Spitzner, L.11
Haile, J.12
Copeland, J.13
Lewandowski, S.14
-
37
-
-
0016081584
-
Protection and the control of information sharing in multics
-
July, [Online]. Available
-
J. H. Saltzer, "Protection and the control of information sharing in multics," Commun. ACM, vol. 17, pp. 388-402, July 1974. [Online]. Available: http://doi.acm.org/10.1145/361011.361067
-
(1974)
Commun. ACM
, vol.17
, pp. 388-402
-
-
Saltzer, J.H.1
-
38
-
-
48749115606
-
A knowledge-base model for insider threat prediction
-
West Point, New York, USA. IEEE, June
-
Q. Althebyan and B. Panda, "A knowledge-base model for insider threat prediction," in Proc. of the 2007 IEEE SMC Information Assurance and Security Workshop (IAW'07), West Point, New York, USA. IEEE, June 2007, pp. 239-246.
-
(2007)
Proc. of the 2007 IEEE SMC Information Assurance and Security Workshop (IAW'07)
, pp. 239-246
-
-
Althebyan, Q.1
Panda, B.2
-
39
-
-
84886878090
-
-
University of Twente, Tech. Rep
-
T. Dimkov, W. Pieters, and P. Hartel, "Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain," University of Twente, Tech. Rep., 2009.
-
(2009)
Portunes: Generating Attack Scenarios By Finding Inconsistencies Between Security Policies In the Physical, Digital and Social Domain
-
-
Dimkov, T.1
Pieters, W.2
Hartel, P.3
-
40
-
-
79953081868
-
Portunes: Representing attack scenarios spanning through the physical, digital and social domain
-
Paphos, Cyprus, LNCS. Springer Verlag, March
-
T. Dimkov, W. Pieters and P. Hartel, "Portunes: representing attack scenarios spanning through the physical, digital and social domain," in Proc. of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), Paphos, Cyprus, LNCS. Springer Verlag, March 2010.
-
(2010)
Proc. of the Joint Workshop On Automated Reasoning For Security Protocol Analysis and Issues In the Theory of Security (ARSPA-WITS'10)
-
-
Dimkov, T.1
Pieters, W.2
Hartel, P.3
-
42
-
-
57649097309
-
An extensible analysable system model
-
C. W. Probst, "An extensible analysable system model," Information Security Technical Report, vol. 13, pp. 235-246, 2008.
-
(2008)
Information Security Technical Report
, vol.13
, pp. 235-246
-
-
Probst, C.W.1
-
43
-
-
77950556924
-
We have met the enemy and he is us
-
September, Lake Tahoe, California, USA. ACM Press
-
M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates, "We have met the enemy and he is us," in Proc. of the 2008 Workshop on New Security Paradigms (NSPW'08), Lake Tahoe, California, USA. ACM Press, September 2008, pp. 1-12.
-
(2008)
Proc. of the 2008 Workshop On New Security Paradigms (NSPW'08)
, pp. 1-12
-
-
Bishop, M.1
Engle, S.2
Peisert, S.3
Whalen, S.4
Gates, C.5
-
44
-
-
84995602633
-
-
Springer
-
C. W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Eds., Insider Threats in Cybersecurity. Springer, 2010.
-
(2010)
Insider Threats In Cybersecurity
-
-
Probst, C.W.1
Hunker, J.2
Gollmann, D.3
Bishop, M.4
-
45
-
-
33644924551
-
-
Defense Personnel Security Research Center (PERSEREC), Monterey, CA, Tech. Rep. 05-13
-
E. D. Shaw and L. F. Fischer, "Ten tales of betrayal: The threat to corporate infrastructures by information technology insiders analysis and observations," Defense Personnel Security Research Center (PERSEREC), Monterey, CA, Tech. Rep. 05-13, 2005.
-
(2005)
Ten Tales of Betrayal: The Threat to Corporate Infrastructures By Information Technology Insiders Analysis and Observations
-
-
Shaw, E.D.1
Fischer, L.F.2
-
46
-
-
33745291009
-
Getting even or moving on? power, procedural justice and types of offense as predictors of revenge, forgiveness, reconciliation and avoidance in organizations
-
K. Aquino, T. M. Tripp, and R. J. Bies, "Getting even or moving on? power, procedural justice and types of offense as predictors of revenge, forgiveness, reconciliation and avoidance in organizations," Journal of Applied Psychology, vol. 91, no. 3, pp. 653-668, 2006.
-
(2006)
Journal of Applied Psychology
, vol.91
, Issue.3
, pp. 653-668
-
-
Aquino, K.1
Tripp, T.M.2
Bies, R.J.3
-
47
-
-
85047685143
-
How employees respond to personal offense: The effects of blame attribution, victim status, and offender status on revenge and reconciliation in the workplace
-
K. Aquino, T. M. Tripp, and R. J. Bies, "How employees respond to personal offense: The effects of blame attribution, victim status, and offender status on revenge and reconciliation in the workplace," Journal of Applied Psychology, vol. 86, no. 1, pp. 52-59, 2001.
-
(2001)
Journal of Applied Psychology
, vol.86
, Issue.1
, pp. 52-59
-
-
Aquino, K.1
Tripp, T.M.2
Bies, R.J.3
-
48
-
-
33749645791
-
Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment
-
D. De Cremer, "Unfair treatment and revenge taking: The roles of collective identification and feelings of disappointment," Group Dynamics: Theory, Research and Practice, vol. 10, no. 3, pp. 220-232, 2006.
-
(2006)
Group Dynamics: Theory, Research and Practice
, vol.10
, Issue.3
, pp. 220-232
-
-
de Cremer, D.1
-
49
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
[Online]. Available
-
E. E. Schultz, "A framework for understanding and predicting insider attacks," Computers & Security, vol. 21, no. 6, pp. 526-531, 2002. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-46XGM6D-9/2/69a602ad8a9c42af84570b33777c4c0c
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
51
-
-
33846978980
-
-
Defense Personnel Security Research Center (PERSEREC), Monterey, CA, Tech. Rep. 05-10
-
L. A. Kramer, J. Richards J. Heuer, and K. S. Crawford, "Technological, social and economic trends that are increasing u.s. vulnerability to insider espionage," Defense Personnel Security Research Center (PERSEREC), Monterey, CA, Tech. Rep. 05-10, 2005.
-
(2005)
Technological, Social and Economic Trends That Are Increasing U.S. Vulnerability to Insider Espionage
-
-
Kramer, L.A.1
Richards, J.2
Heuer, J.3
Crawford, K.S.4
-
53
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of it misuse
-
[Online]. Available
-
G. B. Magklaras and S. M. Furnell, "Insider threat prediction tool: Evaluating the probability of it misuse," Computers & Security, vol. 21, no. 1, pp. 62-73, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8G-452D9TY-C/2/d3ce0be409d1fbb34d981e7f0cfecc13
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
54
-
-
33646134102
-
Developing an insider threat model using functional decomposition
-
ser. Lecture Notes in Computer Science, V. Gorodetsky, I. Kotenko, and V. Skormin, Eds. Springer Berlin/Heidelberg, [Online]. Available
-
J. W. Butts, R. F. Mills, and R. O. Baldwin, "Developing an insider threat model using functional decomposition," in Computer Network Security, ser. Lecture Notes in Computer Science, V. Gorodetsky, I. Kotenko, and V. Skormin, Eds. Springer Berlin/Heidelberg, 2005, vol. 3685, pp. 412-417. [Online]. Available: http://dx.doi.org/10.1007/1156032632
-
(2005)
Computer Network Security
, vol.3685
, pp. 412-417
-
-
Butts, J.W.1
Mills, R.F.2
Baldwin, R.O.3
-
55
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Yokohama, Japan. IEEE, June-July
-
R. Chinchani, A. Iyer, H. Q. Ngo, and S. Upadhyaya, "Towards a theory of insider threat assessment," in Proc. of the 2005 International Conference on Dependable Systems and Networks (DSN'05), Yokohama, Japan. IEEE, June-July 2005, pp. 108-117.
-
(2005)
Proc. of the 2005 International Conference On Dependable Systems and Networks (DSN'05)
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
56
-
-
84886931577
-
Management and education of the risk of insider threat (merit): System dynamics modeling of computer system sabotage
-
Nijmegen, The Netherlands. System Dynamics Society, July
-
D. M. Cappelli, A. G. Desai, A. P. Moore, T. J. Shimeall, E. A. Weaver, and B. J. Willke, "Management and education of the risk of insider threat (merit): System dynamics modeling of computer system sabotage," in Proc. of the 24th International Conference of the System Dynamics Society, Nijmegen, The Netherlands. System Dynamics Society, July 2006.
-
Proc. of the 24th International Conference of the System Dynamics Society
, pp. 2006
-
-
Cappelli, D.M.1
Desai, A.G.2
Moore, A.P.3
Shimeall, T.J.4
Weaver, E.A.5
Willke, B.J.6
-
57
-
-
84886910517
-
Dtb project: A behavioral model for detecting insider threats
-
McLean, VA, USA. The MITRE Corporation
-
P. C. Costa, D. Barbará, K. B. Laskey, E. J. Wright, G. Alghamdi, S. Mirza, M. Revankar, and T. Shackelford, "Dtb project: A behavioral model for detecting insider threats," in Proc. of the 2005 International Conference on Intelligence Analysis, McLean, VA, USA. The MITRE Corporation, 2005.
-
Proc. of the 2005 International Conference On Intelligence Analysis
, pp. 2005
-
-
Costa, P.C.1
Barbará, D.2
Laskey, K.B.3
Wright, E.J.4
Alghamdi, G.5
Mirza, S.6
Revankar, M.7
Shackelford, T.8
-
58
-
-
24944445620
-
An ontological approach to the document access problem of insider threat
-
ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds. Springer Berlin/Heidelberg, [Online]. Available
-
B. Aleman-Meza, P. Burns, M. Eavenson, D. Palaniswami, and A. Sheth, "An ontological approach to the document access problem of insider threat," in Intelligence and Security Informatics, ser. Lecture Notes in Computer Science, P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F.-Y. Wang, H. Chen, and R. C. Merkle, Eds. Springer Berlin/Heidelberg, 2005, vol. 3495, pp. 45-47. [Online]. Available: http://dx.doi.org/10.1007/1142799547
-
(2005)
Intelligence and Security Informatics
, vol.3495
, pp. 45-47
-
-
Aleman-Meza, B.1
Burns, P.2
Eavenson, M.3
Palaniswami, D.4
Sheth, A.5
-
59
-
-
27844543023
-
-
U.S. Secret Service and CERT Coordination Center, Tech. Rep, available from, (last viewed March 2011)
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, and S. Rogers, "Insider threat study: Computer system sabotage in critical infrastructure sectors," U.S. Secret Service and CERT Coordination Center, Tech. Rep., 2005, available from http://www.cert.org/insiderthreat/insidercross.html (last viewed March 2011).
-
(2005)
Insider Threat Study: Computer System Sabotage In Critical Infrastructure Sectors
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
61
-
-
84857969279
-
-
Springer
-
M. Bishop, S. Engle, D. A. Frincke, C. Gates, F. L. Greitzer, S. Peisert, and S. Whalen, A Risk Management Approach to the "Insider Threat". Springer, 2010, ch. in [44].
-
(2010)
A Risk Management Approach to The "Insider Threat"
, pp. 44
-
-
Bishop, M.1
Engle, S.2
Frincke, D.A.3
Gates, C.4
Greitzer, F.L.5
Peisert, S.6
Whalen, S.7
-
62
-
-
84886900224
-
-
Director of Central Intelligence/Intelligence, Central Intelligence Agency, 1990, project Slammer is a CIA-sponsored study of Americans convicted of espionage against the United States. A declassified interim report is available at, and http://antipolygraph.org/documents/slammer-12-04-1990.pdf
-
Director of Central Intelligence/Intelligence, "Community staff memorandum ics 0858-90: Project slammer interim report (u)," Central Intelligence Agency, 1990, project Slammer is a CIA-sponsored study of Americans convicted of espionage against the United States. A declassified interim report is available at: http://antipolygraph.org/documents/slammer-12-04-1990.shtml and http://antipolygraph.org/documents/slammer-12-04-1990.pdf.
-
Community Staff Memorandum Ics 0858-90: Project Slammer Interim Report (u)
-
-
-
65
-
-
0347887514
-
Inside the mind of the insider
-
E. D. Shaw, J. M. Post, and K. G. Ruby, "Inside the mind of the insider," Security Management, vol. 43, no. 12, p. 34, 1999.
-
(1999)
Security Management
, vol.43
, Issue.12
, pp. 34
-
-
Shaw, E.D.1
Post, J.M.2
Ruby, K.G.3
-
66
-
-
58149425798
-
A theory of human motivation
-
A. H. Maslow, "A theory of human motivation," Psychological Review, vol. 50, no. 4, pp. 370-396, 1943.
-
(1943)
Psychological Review
, vol.50
, Issue.4
, pp. 370-396
-
-
Maslow, A.H.1
-
67
-
-
84886876579
-
Insider threats: Strategies for prevention, mitigation, and response
-
[Online]. Available
-
C. W. Probst, J. Hunker, M. Bishop, L. Coles-Kemp, and D. Gollmann, "Insider threats: Strategies for prevention, mitigation, and response," Dagstuhl Seminar Proceedings, 2010. [Online]. Available: http://drops.dagstuhl.de/opus/volltexte/2010/2903
-
(2010)
Dagstuhl Seminar Proceedings
-
-
Probst, C.W.1
Hunker, J.2
Bishop, M.3
Coles-Kemp, L.4
Gollmann, D.5
-
68
-
-
32644465248
-
-
U.S. Secret Service and CERT Coordination Center, Tech. Rep, available from, (last viewed March 2011)
-
M. R. Randazzo, M. M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider threat study: Illicit cyber activity in the banking and finance sector," U.S. Secret Service and CERT Coordination Center, Tech. Rep., 2004, available from http://www.cert.org/archive/pdf/bankfin040820.pdf (last viewed March 2011).
-
(2004)
Insider Threat Study: Illicit Cyber Activity In the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
71
-
-
84858241555
-
-
Springer
-
S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. W. Smith, Eds., Insider Attack and Cyber Security: Beyond the Hacker. Springer, 2008.
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
-
-
Stolfo, S.1
Bellovin, S.2
Hershkop, S.3
Keromytis, A.4
Sinclair, S.5
Smith, S.W.6
|