{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:56:44Z","timestamp":1772798204367,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"value":"9780387773216","type":"print"},{"value":"9780387773223","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-77322-3_3","type":"book-chapter","created":{"date-parts":[[2008,3,6]],"date-time":"2008-03-06T15:47:27Z","timestamp":1204818447000},"page":"17-52","source":"Crossref","is-referenced-by-count":20,"title":["The \u201cBig Picture\u201d of Insider IT Sabotage Across U.S. Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Andrew P.","family":"Moore","sequence":"first","affiliation":[]},{"given":"Dawn M.","family":"Cappelli","sequence":"additional","affiliation":[]},{"given":"Randall F.","family":"Trzeciak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Anderson, D.F.; Cappelli, D.M.; Gonzalez, J.J.; Mojtahedzadeh, M.; Moore, A.P.; Rich, E.; Sarriegui, J.M.; Shimeall, T.J.; Stanton, J.M.; Weaver, E.; and Zagonel, A. 2004. Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem. Proceedings of the 22nd\n                International Conference of the System Dynamics Society, July 2004. Available at http:\/\/www.cert.org\/archive\/pdf\/InsiderThreatSystemDynamics.pdf."},{"key":"3_CR2","unstructured":"Band, S.R.; Cappelli, D. M.; Fischer, L.F.; Moore, A. P.; Shaw, E.D.; and Trzeciak, R.F 2006. \u201cComparing Insider IT Sabotage and Espionage: A Model-Based Analysis\u201d Software Engineering Institute Technical Report CMU\/SEI-2006-TR-026, Carnegie Mellon University, December 2006. http:\/\/www.cert.org\/archive\/pdf\/06tr026.pdf."},{"key":"3_CR3","unstructured":"Cappelli, D. M.; Desai, A. G.; Moore, A. P.; Shimeall, T. J.; Weaver, E. A.; and Willke, B. J. 2006a. \u201cManagement and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers\u2019 Information, Systems, or Networks\u201d. Proceedings of the 24th International System Dynamics Conference. Nijmegen, Netherlands, July 2006. http:\/\/www.albany.edu\/cpr\/sds\/conf2006\/proceed\/proceed.pdf."},{"key":"3_CR4","unstructured":"Cappelli, D.M.; Moore, A.P.; Shimeall, T.J.; and Trzeciak, R.J. 2006b. \u201cCommon Sense Guide to Prevention and Detection of Insider Threats: Version 2.1,\u201d Report of Carnegie Mellon\n                University, CyLab, and the Internet Security Alliance, July 2006 (update of the April 2005 Version 1.0). http:\/\/www.cert.org\/archive\/pdf\/CommonSenseInsiderThreatsV2.1-1- 070118.pdf"},{"key":"3_CR5","unstructured":"Keeney, M.M.; Kowalski, E.F.; Cappelli, D.M.; Moore, A.P.; Shimeall, T.J.; and Rogers, S.N. 2005. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. Joint SEI and U.S. Secret Service Report, May 2005. Available at http:\/\/www.cert.org\/archive\/pdf\/insidercross051105.pdf."},{"key":"3_CR6","volume-title":"Dynamics of Growth in a Finite World","author":"D.L. Meadows","year":"1974","unstructured":"Meadows, D. L.; Behrens, W. W.; Meadows D. H.; Naill, R. F.; Randers, J.; and Zahn, E. K. O. 1974. Dynamics of Growth in a Finite World. Cambridge, MA: Wright-Allen Press, Inc.."},{"key":"3_CR7","unstructured":"Melara, C.; Sarriegui, J.M.; Gonzalez, J.J.; Sawicka, A.; and Cooke, D.L. 2003. A System Dynamics Model of an Insider Attack on an Information System. Proceedings of the 21st International\n                Conference of the System Dynamics Society July 20-24, New York, NY, USA."},{"key":"3_CR8","unstructured":"Moore, A.P.; Joseph, H.G.; Trzeciak, R.F.; Cappelli, D.M. 2007. Instructional Case of Insider IT Sabotage: An Instructor\u2019s Manual, in preparation."},{"key":"3_CR9","volume-title":"The Art & Craft of Case Writing","author":"W. Naumes","year":"1999","unstructured":"Naumes, W.; and Naumes, M.J. 1999. The Art & Craft of Case Writing. Thousand Oaks, California: SAGE Publications."},{"key":"3_CR10","unstructured":"Rich, E.; Martinez-Moyano, I.J.; Conrad, S.; Cappelli, D.M.; Moore, A.P.; Shimeall, T.J.; Andersen, D.F.; Gonzalez, J.J.; Ellison, R.J.; Lipson, H.F.; Mundie, D.A.; Sarriegui, J.M.; Sawicka, A.; Stewart, T.R.; Torres, J.M.; Weaver, E.A.; and Wiik, J. 2005. Simulating Insider Cyber-Threat Risks: A Model-Based Case and a Case-Based Model. Proceedings of the 23rd\n                International Conference of the System Dynamics Society, July 2005."},{"key":"3_CR11","volume-title":"Business Dynamics: Systems Thinking and Modeling for a Complex World","author":"J.D. Sterman","year":"2000","unstructured":"Sterman, J.D. 2000. Business Dynamics: Systems Thinking and Modeling for a Complex World. New York, NY: McGraw-Hill."},{"key":"3_CR12","volume-title":"Case Study Research.","author":"R.K. Yin","year":"2003","unstructured":"Yin, R.K. (2003). Case Study Research (3 ed.) Thousand Oaks: Sage Publications.","edition":"3 ed.)"}],"container-title":["Advances in Information Security","Insider Attack and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-77322-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:14:54Z","timestamp":1619669694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-77322-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387773216","9780387773223"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-77322-3_3","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[]}}