메뉴 건너뛰기




Volumn 2, Issue 1, 2011, Pages 28-49

A preliminary model of insider theft of intellectual property

Author keywords

Information security; Insider threat; Modeling; System dynamics; Theft of information; Theft of intellectual property

Indexed keywords


EID: 84855181760     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (18)

References (27)
  • 3
    • 49249119924 scopus 로고    scopus 로고
    • Bulford, "Insiders behaving badly
    • J. Predd, S. Pfleeger, J. Hunker, and C. Bulford, "Insiders behaving badly," IEEE Security and Privacy, vol. 6, no. 4, pp. 66-70, July/August 2008.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.4 , pp. 66-70
    • Predd, J.1    Pfleeger, S.2    Hunker, J.3
  • 4
    • 0036000502 scopus 로고    scopus 로고
    • The structure of counterproductive work behaviors: Dimensionality and relationships with facets of job performance
    • P. Sackett, "The structure of counterproductive work behaviors: Dimensionality and relationships with facets of job performance," International Journal of Selection and Assessment, vol. 10, pp. 5-11, 2002.
    • (2002) International Journal of Selection and Assessment , vol.10 , pp. 5-11
    • Sackett, P.1
  • 5
    • 0003370351 scopus 로고    scopus 로고
    • Counterproductive behaviors at work
    • Work and Organizational Psychology, N. Anderson, D. Ones, H. Sinangil, and C. Viswesvaran, Eds. New York, NY: Sage Publications, Ltd
    • P. Sackett and C. Devore, "Counterproductive behaviors at work," in Handbook of Industrial, Work and Organizational Psychology, N. Anderson, D. Ones, H. Sinangil, and C. Viswesvaran, Eds. New York, NY: Sage Publications, Ltd., 2001, pp. 145-164.
    • (2001) Handbook of Industrial , pp. 145-164
    • Sackett, P.1    Devore, C.2
  • 7
    • 79960583168 scopus 로고    scopus 로고
    • The'big picture' of insider it sabotage across U.S. Critical Infrastructures
    • S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC
    • A. Moore, D. Cappelli, and R. Trzeciak, "The'big picture' of insider it sabotage across U.S. Critical Infrastructures," in Insider Attack and Cyber Security: Beyond the Hacker, S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC, 2008, pp. 17-52.
    • (2008) Insider Attack and Cyber Security: Beyond the Hacker , pp. 17-52
    • Moore, A.1    Cappelli, D.2    Trzeciak, R.3
  • 9
    • 0036000505 scopus 로고    scopus 로고
    • The big five personality dimensions and counterproductive behaviors
    • J. Salgado, "The big five personality dimensions and counterproductive behaviors," International Journal of Selection and Assessment, vol. 10, pp. 117-125, 2002.
    • (2002) International Journal of Selection and Assessment , vol.10 , pp. 117-125
    • Salgado, J.1
  • 10
    • 33747272000 scopus 로고    scopus 로고
    • Relationship of personality traits and counterproductive work behaviors: The mediating effects of job satisfaction
    • M. Mount, R. Ilies, and E. Johnson, "Relationship of personality traits and counterproductive work behaviors: The mediating effects of job satisfaction," Personnel Psychology, vol. 59, pp. 591-622, 2006.
    • (2006) Personnel Psychology , vol.59 , pp. 591-622
    • Mount, M.1    Ilies, R.2    Johnson, E.3
  • 11
    • 0036438421 scopus 로고    scopus 로고
    • Insider or outsider? how employee perceptions of insider status affect their work behavior
    • C. Stamper and S. Masterson, "Insider or outsider? how employee perceptions of insider status affect their work behavior," Journal of Organizational Behavior, vol. 23, no. 8, pp. 875-894.
    • Journal of Organizational Behavior , vol.23 , Issue.8 , pp. 875-894
    • Stamper, C.1    Masterson, S.2
  • 14
    • 0141480474 scopus 로고    scopus 로고
    • The bad boys of cyberspace: Deviant behavior in multimedia chat communities
    • J. Suler and W. Phillips, "The bad boys of cyberspace: Deviant behavior in multimedia chat communities," CyberPsychology and Behavior, vol. 1, pp. 275-294, 1998.
    • (1998) CyberPsychology and Behavior , vol.1 , pp. 275-294
    • Suler, J.1    Phillips, W.2
  • 15
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems: The psychology of the dangerous insider
    • E. Shaw, K. Ruby, and J. Post, "The insider threat to information systems: The psychology of the dangerous insider," Security Awareness Bulletin, no. 2-98, pp. 27-46, 1998.
    • (1998) Security Awareness Bulletin , pp. 27-46
    • Shaw, E.1    Ruby, K.2    Post, J.3
  • 16
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E. Spafford, "A framework for understanding and predicting insider attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, October 2002.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Spafford, E.1
  • 17
    • 3042863345 scopus 로고    scopus 로고
    • The missing link in information security: Three dimensional profiling
    • T. Gudaitis, "The missing link in information security: Three dimensional profiling," Cyber Psychology and Behavior, vol. 1, no. 4, pp. 321-340, 1998.
    • (1998) Cyber Psychology and Behavior , vol.1 , Issue.4 , pp. 321-340
    • Gudaitis, T.1
  • 20
    • 33846995502 scopus 로고    scopus 로고
    • Espionage against the United States by American citizens 1947-2001, Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep
    • PERSEREC-TR-02-5
    • K. Herbig and M. Wiskoff, "Espionage against the United States by American citizens 1947-2001," Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep. PERSEREC-TR-02-5, July 2002.
    • (2002) Tech. Rep
    • Herbig, K.1    Wiskoff, M.2
  • 22
    • 75149124684 scopus 로고    scopus 로고
    • Maloof, "Detecting insider theft of trade secrets," IEEE Security and Privacy
    • D. Caputo, G. Stephens, and M. Maloof, "Detecting insider theft of trade secrets," IEEE Security and Privacy, vol. 7, no. 6, pp. 14-21, November/December 2009.
    • (2009) November/December , vol.7 , Issue.6 , pp. 14-21
    • Caputo, D.1    Stephens, G.2
  • 23
    • 0003673547 scopus 로고    scopus 로고
    • Thousand Oaks, CA: Sage Publications
    • R. Yin, Case Study Research (4th ed.). Thousand Oaks, CA: Sage Publications, 2009.
    • (2009) Case Study Research
    • Yin, R.1
  • 26
    • 0024357625 scopus 로고    scopus 로고
    • Understanding behavior in escalation situations
    • B. Staw and J. Ross, "Understanding behavior in escalation situations," Science, vol. 246, no. 4927, pp. 216-220.
    • Science , vol.246 , Issue.4927 , pp. 216-220
    • Staw, B.1    Ross, J.2
  • 27
    • 79952545666 scopus 로고    scopus 로고
    • Data theft: A prototypical insider threat
    • S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC
    • M. McCormick, "Data theft: A prototypical insider threat," in Insider Attack and Cyber Security: Beyond the Hacker, S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC, 2008, pp. 53-68.
    • (2008) Insider Attack and Cyber Security: Beyond the Hacker , pp. 53-68
    • McCormick, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.