-
1
-
-
49049121156
-
Simulating insider cyberthreat risks: A model-based case and a case-based model
-
System Dynamics Society, July
-
E. Rich, I. Martinez-Moyano, S. Conrad, D. Cappelli, A. Moore, and T. S. et.al., "Simulating insider cyberthreat risks: A model-based case and a case-based model," in Proc. of the 23rd International Conference of the System Dynamics Society, Boston, USA. System Dynamics Society, July 2005.
-
(2005)
Proc. of the 23rd International Conference of the System Dynamics Society, Boston, USA
-
-
Rich, E.1
Martinez-Moyano, I.2
Conrad, S.3
Cappelli, D.4
Moore, A.5
-
2
-
-
84886875588
-
-
Pittsburgh, PA, Tech. Rep
-
D. Capelli, L. Fischer, A. Moore, E. Shaw, and R. Trzeciak, "Common sense guide to prevention and detection of insider threat (3rd ed.)," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Tech. Rep., September 2008.
-
(2008)
Common Sense Guide to Prevention and Detection of Insider Threat (3rd Ed.)," Software Engineering Institute, Carnegie Mellon University
-
-
Capelli, D.1
Fischer, L.2
Moore, A.3
Shaw, E.4
Trzeciak, R.5
-
3
-
-
49249119924
-
Bulford, "Insiders behaving badly
-
J. Predd, S. Pfleeger, J. Hunker, and C. Bulford, "Insiders behaving badly," IEEE Security and Privacy, vol. 6, no. 4, pp. 66-70, July/August 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.4
, pp. 66-70
-
-
Predd, J.1
Pfleeger, S.2
Hunker, J.3
-
4
-
-
0036000502
-
The structure of counterproductive work behaviors: Dimensionality and relationships with facets of job performance
-
P. Sackett, "The structure of counterproductive work behaviors: Dimensionality and relationships with facets of job performance," International Journal of Selection and Assessment, vol. 10, pp. 5-11, 2002.
-
(2002)
International Journal of Selection and Assessment
, vol.10
, pp. 5-11
-
-
Sackett, P.1
-
5
-
-
0003370351
-
Counterproductive behaviors at work
-
Work and Organizational Psychology, N. Anderson, D. Ones, H. Sinangil, and C. Viswesvaran, Eds. New York, NY: Sage Publications, Ltd
-
P. Sackett and C. Devore, "Counterproductive behaviors at work," in Handbook of Industrial, Work and Organizational Psychology, N. Anderson, D. Ones, H. Sinangil, and C. Viswesvaran, Eds. New York, NY: Sage Publications, Ltd., 2001, pp. 145-164.
-
(2001)
Handbook of Industrial
, pp. 145-164
-
-
Sackett, P.1
Devore, C.2
-
6
-
-
43149116934
-
Preliminary system dynamics maps of the insider cyber-threat problem
-
System Dynamics Society, July
-
D. Anderson, D. Cappelli, J. Gonzalez, M. Mojahedzdeh, A. Moore, E. Rich, and et.al., "Preliminary system dynamics maps of the insider cyber-threat problem," in Proc. of the 22nd International Conference of the System Dynamics Society, Keble College, Oxford, UK. System Dynamics Society, July 2004.
-
(2004)
Proc. of the 22nd International Conference of the System Dynamics Society, Keble College, Oxford, UK
-
-
Anderson, D.1
Cappelli, D.2
Gonzalez, J.3
Mojahedzdeh, M.4
Moore, A.5
Rich, E.6
-
7
-
-
79960583168
-
The'big picture' of insider it sabotage across U.S. Critical Infrastructures
-
S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC
-
A. Moore, D. Cappelli, and R. Trzeciak, "The'big picture' of insider it sabotage across U.S. Critical Infrastructures," in Insider Attack and Cyber Security: Beyond the Hacker, S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC, 2008, pp. 17-52.
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
, pp. 17-52
-
-
Moore, A.1
Cappelli, D.2
Trzeciak, R.3
-
8
-
-
84886925669
-
Management and ducation of the risk of insider threat (MERIT): Mitigating the risk of sabotage to employers' information, systems, or networks
-
System Dynamics Society, July
-
D. Cappelli, A. Desai, A. Moore, T. Shimeall, E. Weaver, and B. Willke, "Management and ducation of the risk of insider threat (MERIT): Mitigating the risk of sabotage to employers' information, systems, or networks," in Proc. of the 24th International Conference of the System Dynamics Society, Nijmegen, The Netherlands. System Dynamics Society, July 2006.
-
(2006)
Proc. of the 24th International Conference of the System Dynamics Society, Nijmegen, the Netherlands
-
-
Cappelli, D.1
Desai, A.2
Moore, A.3
Shimeall, T.4
Weaver, E.5
Willke, B.6
-
9
-
-
0036000505
-
The big five personality dimensions and counterproductive behaviors
-
J. Salgado, "The big five personality dimensions and counterproductive behaviors," International Journal of Selection and Assessment, vol. 10, pp. 117-125, 2002.
-
(2002)
International Journal of Selection and Assessment
, vol.10
, pp. 117-125
-
-
Salgado, J.1
-
10
-
-
33747272000
-
Relationship of personality traits and counterproductive work behaviors: The mediating effects of job satisfaction
-
M. Mount, R. Ilies, and E. Johnson, "Relationship of personality traits and counterproductive work behaviors: The mediating effects of job satisfaction," Personnel Psychology, vol. 59, pp. 591-622, 2006.
-
(2006)
Personnel Psychology
, vol.59
, pp. 591-622
-
-
Mount, M.1
Ilies, R.2
Johnson, E.3
-
11
-
-
0036438421
-
Insider or outsider? how employee perceptions of insider status affect their work behavior
-
C. Stamper and S. Masterson, "Insider or outsider? how employee perceptions of insider status affect their work behavior," Journal of Organizational Behavior, vol. 23, no. 8, pp. 875-894.
-
Journal of Organizational Behavior
, vol.23
, Issue.8
, pp. 875-894
-
-
Stamper, C.1
Masterson, S.2
-
14
-
-
0141480474
-
The bad boys of cyberspace: Deviant behavior in multimedia chat communities
-
J. Suler and W. Phillips, "The bad boys of cyberspace: Deviant behavior in multimedia chat communities," CyberPsychology and Behavior, vol. 1, pp. 275-294, 1998.
-
(1998)
CyberPsychology and Behavior
, vol.1
, pp. 275-294
-
-
Suler, J.1
Phillips, W.2
-
15
-
-
0010886652
-
The insider threat to information systems: The psychology of the dangerous insider
-
E. Shaw, K. Ruby, and J. Post, "The insider threat to information systems: The psychology of the dangerous insider," Security Awareness Bulletin, no. 2-98, pp. 27-46, 1998.
-
(1998)
Security Awareness Bulletin
, pp. 27-46
-
-
Shaw, E.1
Ruby, K.2
Post, J.3
-
16
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E. Spafford, "A framework for understanding and predicting insider attacks," Computers and Security, vol. 21, no. 6, pp. 526-531, October 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Spafford, E.1
-
17
-
-
3042863345
-
The missing link in information security: Three dimensional profiling
-
T. Gudaitis, "The missing link in information security: Three dimensional profiling," Cyber Psychology and Behavior, vol. 1, no. 4, pp. 321-340, 1998.
-
(1998)
Cyber Psychology and Behavior
, vol.1
, Issue.4
, pp. 321-340
-
-
Gudaitis, T.1
-
18
-
-
70149090395
-
-
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Tech. Rep. CMU/SEI-2006-TR-026
-
S. Band, D. Cappelli, L. Fischer, A. Moore, E. Shaw, and R. Trzeciak, "Comparing insider IT sabotage and espionage: A model-based analysis," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Tech. Rep. CMU/SEI-2006-TR-026, December 2006.
-
(2006)
Comparing insider IT sabotage and espionage: A model-based analysis
-
-
Band, S.1
Cappelli, D.2
Fischer, L.3
Moore, A.4
Shaw, E.5
-
20
-
-
33846995502
-
Espionage against the United States by American citizens 1947-2001, Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep
-
PERSEREC-TR-02-5
-
K. Herbig and M. Wiskoff, "Espionage against the United States by American citizens 1947-2001," Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep. PERSEREC-TR-02-5, July 2002.
-
(2002)
Tech. Rep
-
-
Herbig, K.1
Wiskoff, M.2
-
21
-
-
33644924551
-
-
Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep. PERSEREC-TR-0513, September
-
E. Shaw and L. Fischer, "Ten tales of betrayal: The threat to corporate infrastructure by information technology insiders," Defense Personnel Security Research Center, Monterrey, CA, Tech. Rep. PERSEREC-TR-0513, September 2005.
-
(2005)
Ten Tales Of Betrayal: The threat to corporate infrastructure by information technology insiders
-
-
Shaw, E.1
Fischer, L.2
-
22
-
-
75149124684
-
Maloof, "Detecting insider theft of trade secrets," IEEE Security and Privacy
-
D. Caputo, G. Stephens, and M. Maloof, "Detecting insider theft of trade secrets," IEEE Security and Privacy, vol. 7, no. 6, pp. 14-21, November/December 2009.
-
(2009)
November/December
, vol.7
, Issue.6
, pp. 14-21
-
-
Caputo, D.1
Stephens, G.2
-
23
-
-
0003673547
-
-
Thousand Oaks, CA: Sage Publications
-
R. Yin, Case Study Research (4th ed.). Thousand Oaks, CA: Sage Publications, 2009.
-
(2009)
Case Study Research
-
-
Yin, R.1
-
26
-
-
0024357625
-
Understanding behavior in escalation situations
-
B. Staw and J. Ross, "Understanding behavior in escalation situations," Science, vol. 246, no. 4927, pp. 216-220.
-
Science
, vol.246
, Issue.4927
, pp. 216-220
-
-
Staw, B.1
Ross, J.2
-
27
-
-
79952545666
-
Data theft: A prototypical insider threat
-
S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC
-
M. McCormick, "Data theft: A prototypical insider threat," in Insider Attack and Cyber Security: Beyond the Hacker, S. Stolfo, S. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, and S. Smith, Eds. New York, NY: Springer Science+Business Media, LLC, 2008, pp. 53-68.
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
, pp. 53-68
-
-
McCormick, M.1
|