메뉴 건너뛰기




Volumn 26, Issue 2, 2013, Pages 107-124

Enemies within: Redefining the insider threat in organizational security policy

Author keywords

cybercrime; information security; insider threat; organizations; security policy

Indexed keywords


EID: 84876731769     PISSN: 09551662     EISSN: 17434645     Source Type: Journal    
DOI: 10.1057/sj.2012.1     Document Type: Article
Times cited : (49)

References (48)
  • 1
    • 84876732141 scopus 로고    scopus 로고
    • Six more data discs ' are missing '
    • 24 November, accessed 1 August 2011
    • BBC. (2007) Six more data discs ' are missing '. B BC News Online, 24 November, http://news.bbc.co.uk/1/hi/7111056.stm, accessed 1 August 2011.
    • (2007) B BC News Online
  • 2
    • 84876736031 scopus 로고    scopus 로고
    • Pension data was on stolen laptop
    • 10 October, accessed 1 August 2011
    • BBC. (2008) Pension data was on stolen laptop. B BC News Online, 10 October, http://news.bbc.co.uk/1/hi/uk/7664274.stm, accessed 1 August 2011.
    • (2008) B BC News Online
  • 3
    • 84876732277 scopus 로고    scopus 로고
    • US and Israel were behind Stuxnet claims researcher
    • 4 March, accessed 1 August 2011
    • BBC. (2011) US and Israel were behind Stuxnet claims researcher. BBC News Online, 4 March, http://www.bbc.co.uk/news/technology-12633240, accessed 1 August 2011.
    • (2011) BBC News Online
  • 4
    • 62849104685 scopus 로고    scopus 로고
    • Position: Insider is relative
    • C.F. Hempelmann and V. Raskin (eds.), New York: ACM Press
    • Bishop, M. (2005) Position: Insider is relative. In: C.F. Hempelmann and V. Raskin (eds.), Proceedings of the New Security Paradigms Workshop. New York: ACM Press.
    • (2005) Proceedings of the New Security Paradigms Workshop
    • Bishop, M.1
  • 5
    • 84876711104 scopus 로고    scopus 로고
    • Hannover, Germany: Dartmouth College. Institute for Information Infrastructure Protection (I3P) research program Research Report no. 16, July 2009, accessed 1 August 2011
    • Caputo, D., Stephens, G., Stephenson, B. and Kim, M. (2009) Human Behavior, Insider Threat, and Awareness: An Empirical Study of Insider Threat Behavior. Hannover, Germany: Dartmouth College. Institute for Information Infrastructure Protection (I3P) research program Research Report no. 16, July 2009, http://www.thei3p.org/docs/publications/134.pdf, accessed 1 August 2011.
    • (2009) Human Behavior, Insider Threat, and Awareness: An Empirical Study of Insider Threat Behavior
    • Caputo, D.1    Stephens, G.2    Stephenson, B.3    Kim, M.4
  • 8
    • 84876699273 scopus 로고    scopus 로고
    • CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, accessed 1 August 2011. (Summaries also available for 2004 - 2009)
    • CERT. (2010) 2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses. CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, http://www.cert.org/ archive/pdf/ecrimesummary10.pdf, accessed 1 August 2011. (Summaries also available for 2004 - 2009).
    • (2010) 2010 CyberSecurity Watch Survey: Cybercrime Increasing Faster Than Some Company Defenses
  • 9
    • 84867672691 scopus 로고    scopus 로고
    • CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, accessed 1 August 2011. (Summaries also available for years 2004 - 2010)
    • CERT. (2011) 2011 CyberSecurity Watch Survey: How bad is the insider threat? CERT Insider Threat Team, Pittsburgh: Carnegie Mellon University, Software Engineering Institute, http://www.cert.org/archive/pdf/ CyberSecuritySurvey2011Data.pdf, accessed 1 August 2011. (Summaries also available for years 2004 - 2010).
    • (2011) 2011 CyberSecurity Watch Survey: How Bad Is the Insider Threat?
  • 10
    • 84876737412 scopus 로고    scopus 로고
    • 2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses
    • 25 January, accessed 1 August 2011
    • EON. (2010) 2010 CyberSecurity Watch Survey: Cybercrime increasing faster than some company defenses. Enhanced Online News (EON), 25 January, http://eon.businesswire.com/news/eon/20100125006500/en/CSO/Cybercrime/ cybersecurity, accessed 1 August 2011.
    • (2010) Enhanced Online News (EON)
  • 11
  • 19
    • 84876717816 scopus 로고    scopus 로고
    • LMRMC, LM Research & Marketing Consultancy, 20 September (Unpublished)
    • LMRMC. (2010) Online riskiness: Questionnaire results - Overall. LM Research & Marketing Consultancy, 20 September (Unpublished).
    • (2010) Online Riskiness: Questionnaire Results - Overall
  • 20
    • 84876727366 scopus 로고    scopus 로고
    • Mail Online, 12 April, accessed 1 August 2011
    • Mail. (2008) Military laptop stolen from McDonald's as ' Army captain eats a Big Mac'. Mail Online, 12 April, http://www.dailymail.co.uk/news/article- 559178/Military-laptop-stolen-McDonalds-Army-captain-eats-Big-Mac. html#ixzz13NxVuGd0, accessed 1 August 2011.
    • (2008) Military Laptop Stolen from McDonald's As ' Army Captain Eats A Big Mac'
  • 21
    • 84876706884 scopus 로고    scopus 로고
    • Survey: 40 % of hard drives bought on eBay hold personal, corporate data: Buyers found data on everything from corporate spreadsheets to e-mails and photos
    • 10 February, accessed 1 August 2011
    • Mearian, L., (2009) Survey: 40 % of hard drives bought on eBay hold personal, corporate data: Buyers found data on everything from corporate spreadsheets to e-mails and photos. Computerworld, 10 February, http://www.computerworld.com/s/article/9127717/Survey-40-of-hard-drives-bought- on-eBay-hold-personal-corporate-data, accessed 1 August 2011.
    • (2009) Computerworld
    • Mearian, L.1
  • 23
    • 78650018175 scopus 로고    scopus 로고
    • Ponemon Institute, accessed 1 August 2011
    • Ponemon, L. (2008) The cost of a lost laptop. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf, accessed 1 August 2011.
    • (2008) The Cost of A Lost Laptop
    • Ponemon, L.1
  • 25
    • 84855308630 scopus 로고    scopus 로고
    • Ponemon Institute, accessed 1 August 2011
    • Ponemon, L. (2010a) 2009 annual study: Cost of a data breach. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ US-Ponemon-CODB-09-012209-sec.pdf, accessed 1 August 2011.
    • (2010) 2009 Annual Study: Cost of A Data Breach
    • Ponemon, L.1
  • 26
    • 84855308630 scopus 로고    scopus 로고
    • Ponemon Institute, accessed 1 August 2011
    • Ponemon, L. (2010b) 2009 annual study: UK cost of a data breach. Ponemon Institute, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ UK-Ponemon-CODB%202009%20v9.pdf, accessed 1 August 2011.
    • (2010) 2009 Annual Study: UK Cost of A Data Breach
    • Ponemon, L.1
  • 27
    • 84855308630 scopus 로고    scopus 로고
    • Ponemon Institute/Symantec, accessed 1 August 2011
    • Ponemon, L. (2011) 2010 annual study: Cost of a data breach. Ponemon Institute/Symantec, http://www.symantec.com/content/en/us/about/media/pdfs/ symantec-cost-of-data-breach-global-2010.pdf, accessed 1 August 2011.
    • (2011) 2010 Annual Study: Cost of A Data Breach
    • Ponemon, L.1
  • 30
    • 84876732413 scopus 로고    scopus 로고
    • MBNA confirms data loss after laptop containing personal details of thousands of customers was stolen from vendor
    • 23 December, accessed 1 August 2011
    • Raywood, D. (2009) MBNA confirms data loss after laptop containing personal details of thousands of customers was stolen from vendor. SC Magazine, 23 December, http://www.scmagazineuk.com/mbna-confirms-data-lossafter-laptop- containing-personal-details-of-thousands-of-customers-was-stolen-from-vendor/ article/160217/, accessed 1 August 2011.
    • (2009) SC Magazine
    • Raywood, D.1
  • 31
    • 84876740718 scopus 로고    scopus 로고
    • Stolen laptop leads to the loss of details of around 13,000 UK dairy farmers
    • 2 July, accessed 1 August 2011
    • Raywood, D. (2010) Stolen laptop leads to the loss of details of around 13,000 UK dairy farmers. S C Magazine, 2 July, http://www.scmagazineuk.com/ stolen-laptop-leads-to-the-loss-of-details-of-around-13000-uk-dairyfarmers/ article/173843/, accessed 1 August 2011.
    • (2010) S C Magazine
    • Raywood, D.1
  • 35
    • 84866114164 scopus 로고    scopus 로고
    • Malicious insider attacks to rise
    • 11 February, accessed 1 August 2011
    • Shiels, M. (2009) Malicious insider attacks to rise. BBC News Online, 11 February, http://news.bbc.co.uk/1/hi/technology/7875904.stm, accessed 1 August 2011.
    • (2009) BBC News Online
    • Shiels, M.1
  • 37
    • 84876740688 scopus 로고    scopus 로고
    • Anatomy of a data breach: Why breaches happen and what to do about it
    • accessed 1 August 2011
    • Symantec. (2008) Anatomy of a data breach: Why breaches happen and what to do about it. Mountain View: Symantec, http://eval.symantec.com/mktginfo/ enterprise/white-papers/b-anatomy-of-a-data-breach-WP-20049424-1.en-us.pdf, accessed 1 August 2011.
    • (2008) Mountain View: Symantec
  • 38
    • 77949394213 scopus 로고    scopus 로고
    • April, 2009, Symantec, accessed 1 August 2011
    • Symantec. (2009a) Internet Security Threat Report, Volume XIV. April, 2009, Symantec, http://www.symantec.com/business/theme.jsp?themeid=threatreport, accessed 1 August 2011.
    • (2009) Internet Security Threat Report, Volume XIV
  • 40
    • 84876709109 scopus 로고    scopus 로고
    • The trojan. Hydraq incident
    • 18 January, accessed 1 August 2011
    • Symantec. (2010) The Trojan.Hydraq incident. Symantec Security Response Blog, 18 January, http://www.symantec.com/connect/blogs/trojanhydraq-incident, accessed 1 August 2011.
    • (2010) Symantec Security Response Blog
  • 41
    • 77952903083 scopus 로고    scopus 로고
    • Verizon, accessed 1 August 2011
    • Verizon. (2010) 2010 Data Breach Investigations Report. Verizon, http://www.verizonbusiness.com/resources/reports/rp-2010-data-breach-report-en- xg.pdf, accessed 1 August 2011.
    • (2010) 2010 Data Breach Investigations Report
  • 43
    • 51949117093 scopus 로고    scopus 로고
    • Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime
    • (Revised February 2011) , accessed 1 August 2011
    • Wall, D. S. (2008 / 2011) Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11 (6): 861 - 884, (Revised February 2011), http://ssrn.com/abstract=1155155, accessed 1 August 2011.
    • (2008) Information, Communication & Society , vol.11 , Issue.6 , pp. 861-884
    • Wall, D.S.1
  • 46
    • 0344559509 scopus 로고    scopus 로고
    • White House, White House, February, accessed 1 August 2011
    • White House. (2003) The national strategy to secure cyberspace. White House, February, http://www.dhs.gov/xlibrary/assets/National-Cyberspace- Strategy.pdf, accessed 1 August 2011.
    • (2003) The National Strategy to Secure Cyberspace
  • 48
    • 84859371116 scopus 로고    scopus 로고
    • DHS fears a modified Stuxnet could attack US infrastructure
    • 26 July, accessed 1 August 2011
    • Zetter, K. (2011) DHS fears a modified Stuxnet could attack US infrastructure. WIRED, 26 July, http://www.wired.com/threatlevel/2011/07/dhs- fears-stuxnet-attacks/, accessed 1 August 2011.
    • (2011) WIRED
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.