Comparing Insider IT Sabotage and Espionage: A Model- Based Analysis, 2006. ,
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors, MIS Quarterly, vol.39, issue.4, pp.837-864, 2015. ,
DOI : 10.25300/MISQ/2015/39.4.5
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise, Information Systems Frontiers, vol.10, issue.1/2, pp.17-34, 2013. ,
DOI : 10.3233/JCS-2002-101-205
URL : http://eprints.whiterose.ac.uk/75047/1/Knowing_Who_to_Watch_Identifying_attackers_whose_actions_are_hidden.pdf
An Ontology for Insider Threat Indicators: Development and Application, Proceedings of the Ninth Conference on Semantic Technology for Intelligence, Defense and Security, pp.48-53, 2014. ,
Army general upholds Chelsea Manning's conviction, 35-year sentence in WikiLeaks case, U.S. News and World Report, 2014. ,
Understanding insiders: An analysis of risk-taking behavior, Information Systems Frontiers, vol.35, issue.9, pp.5-15, 2013. ,
DOI : 10.1037/0003-066X.35.2.151
Snowden used " web crawler " to scrape NSA, Bloomberg Technology, 2014. ,
M57-Patents Scenario, Digital Corpora (digitalcor pora.org/corpora/scenarios/m57-patents-scenario, p.2017 ,
Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009. ,
DOI : 10.1016/j.diin.2009.06.016
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model, Journal of Management Information Systems, vol.15, issue.4, pp.203-236, 2011. ,
DOI : 10.1080/07421222.1999.11518226
Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination, 2011. ,
DOI : 10.21236/ADA610463
Espionage Against the United States by American Citizens, 1947. ,
Robust Statistics, 2009. ,
DOI : 10.1002/0471725250
Technological, Social and Economic Trends that are Increasing U.S. Vulnerability to Insider Espionage, 2005. ,
DOI : 10.21236/ada433793
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA433793&Location=U2&doc=GetTRDoc.pdf
Insider espionage: Recognizing ritualistic behavior by abstracting technical indicators from past cases, Proceedings of the Twentieth Americas Conference on Information Systems, 2014. ,
Trends 2015: A View from the Front Line, 2014. ,
The justification of a pattern for detecting intellectual property theft by departing insiders, Proceedings of the Nineteenth Conference on Pattern Languages of Programs, 2012. ,
DOI : 10.21236/ADA610785
Robust Regression and Outlier Detection, 2003. ,
DOI : 10.1002/0471725382
Outlier detection: Applications and techniques, International Journal of Computer Science Issues, vol.9, issue.1, pp.307-323, 2012. ,
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, MIS Quarterly, vol.39, issue.1, pp.91-112, 2015. ,
DOI : 10.25300/MISQ/2015/39.1.05
Beyond Deterrence: An Expanded View of Employee Computer Abuse, MIS Quarterly, vol.37, issue.1, pp.1-20, 2013. ,
DOI : 10.25300/MISQ/2013/37.1.01