{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:01:50Z","timestamp":1742968910205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_22","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"242-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pervasive Monitoring as an Insider Threat"],"prefix":"10.1007","author":[{"given":"Dana","family":"Polatin-Reuben","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"22_CR1","unstructured":"Farrel, S., Tschofenig, H.: Pervasive Monitoring is an Attack, (RFC 7258) Internet Engineering Task Force, May 2014. \n                      https:\/\/tools.ietf.org\/html\/rfc7258\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a threat model for storage systems. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pp. 94\u2013102. ACM, New York (2005)","DOI":"10.1145\/1103780.1103795"},{"key":"22_CR3","unstructured":"Johansson, J.M.: Network threat modeling. In: Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE, New York, 9\u201311 June 2003"},{"key":"22_CR4","volume-title":"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)","author":"D Cappelli","year":"2012","unstructured":"Cappelli, D., Moore, A., Trzeciak, R.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pearson Education Inc, New Jersey (2012)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Nurse, J.R.C., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G.R.T., Whitty, M.: Understanding insider threat: a framework for characterising attacks. In: Workshop on Research for Insider Threat (WRIT), in Conjunction with the IEEE Symposium on Security and Privacy (SP). IEEE, New York, 18 May 2014","DOI":"10.1109\/SPW.2014.38"},{"issue":"4","key":"22_CR6","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1037\/0021-9010.89.4.647","volume":"89","author":"B Marcus","year":"2004","unstructured":"Marcus, B., Schuler, H.: Antecedents of counterproductive behavior at work: a general perspective. J. Appl. Psychol. 89(4), 647\u2013660 (2004)","journal-title":"J. Appl. Psychol."},{"key":"22_CR7","volume-title":"The Five Factor Model of Personality: Theoretical Perspectives","author":"JS Wiggins","year":"1996","unstructured":"Wiggins, J.S.: The Five Factor Model of Personality: Theoretical Perspectives. Guildford Press, New York (1996)"},{"issue":"6","key":"22_CR8","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/S0092-6566(02)00505-6","volume":"36","author":"DL Paulhus","year":"2002","unstructured":"Paulhus, D.L., Williams, K.M.: The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. J. Res. Pers. 36(6), 556\u2013563 (2002)","journal-title":"J. Res. Pers."},{"issue":"12","key":"22_CR9","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobbs J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobbs J."},{"issue":"1","key":"22_CR10","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inf. Warfare Secur. Res. 1(1), 80 (2011)","journal-title":"Leading Issues Inf. Warfare Secur. Res."},{"key":"22_CR11","unstructured":"ARMA International: Generally Accepted Recordkeeping Principles\u00ae. \n                      http:\/\/www.arma.org\/docs\/sharepoint-roadshow\/the-principles_executive-summaries_final.doc\n                      \n                     (2012). Accessed 18 Feb 2015"},{"key":"22_CR12","unstructured":"The World Bank: Worldwide Governance Indicators. \n                      http:\/\/data.worldbank.org\/data-catalog\/worldwide-governance-indicators\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR13","unstructured":"Ball, J., Borger, J., Greenwald, G.: Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security, The Guardian. \n                      http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security\n                      \n                     (2013). Accessed 18 Feb 2015"},{"key":"22_CR14","unstructured":"Risen, J., Lichtblau, E.: Bush Lets U.S. Spy on Callers Without Courts, The New York Times, 16 December 2005. \n                      http:\/\/www.nytimes.com\/2005\/12\/16\/politics\/16program.html?pagewanted=all&_r=0\n                      \n                     (2005). Accessed 18 Feb 2015"},{"key":"22_CR15","unstructured":"Cauley, L.: NSA has Massive Database of Americans\u2019 Phone Calls, USA Today, 11 May 2006. \n                      http:\/\/usatoday30.usatoday.com\/news\/washington\/2006-05-10-nsa_x.htm\n                      \n                     (2006). Accessed 18 Feb 2015"},{"key":"22_CR16","unstructured":"National Security Agency\/Central Security Service: Transition 2001, December 2000. \n                      https:\/\/www.eff.org\/document\/nsa-transition-2001\n                      \n                     (2000). Accessed 18 Feb 2015"},{"key":"22_CR17","unstructured":"Greenwald, G., MacAskill, E.: NSA Prism Program Taps in to User Data of Apple, Google and Others, The Guardian, 7 June 2013. \n                      http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\n                      \n                     (2013). Accessed 18 Feb 2015"},{"key":"22_CR18","unstructured":"MacAskill, E., Borger, J., Hopkins, N., Davies, N., Ball, J.: GCHQ Taps Fibre-Optic Cables for Secret Access to World\u2019s Communications, The Guardian, 21 June 2013. \n                      http:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\n                      \n                     (2013). Accessed 18 Feb 2015"},{"key":"22_CR19","unstructured":"Rosenblatt, J.: Google Fights E-Mail Privacy Group Suit it Calls Too Big, Bloomberg Business, 28 February 2014. \n                      http:\/\/www.bloomberg.com\/news\/articles\/2014-02-27\/google-fights-e-mail-privacy-group-suit-it-calls-too-big\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR20","unstructured":"Google Inc.: Google Terms of Service (archive), 14 April 2014. \n                      http:\/\/www.google.com\/intl\/en\/policies\/terms\/archive\/20131111-20140414\/\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR21","unstructured":"Devereaux, R., Greenwald, G., Poitras, L.: Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, The Intercept, 19 May 2014. \n                      https:\/\/firstlook.org\/theintercept\/2014\/05\/19\/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas\/\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR22","unstructured":"Assange, J.: WikiLeaks Statement on the Mass Recording of Afghan Telephone Calls by the NSA, WikiLeaks, 23 May 2014. \n                      https:\/\/wikileaks.org\/WikiLeaks-statement-on-the-mass.html\n                      \n                     (2014). Accessed 18 Feb 2015"},{"key":"22_CR23","unstructured":"Soldatov, A., Borogan, I.: Russia\u2019s Surveillance State, World Policy Journal, Fall 2013. \n                      http:\/\/www.worldpolicy.org\/journal\/fall2013\/Russia-surveillance\n                      \n                     (2013). Accessed 18 Feb 2015"},{"key":"22_CR24","volume-title":"China\u2019s Golden Shield: Corporations and the Development of Surveillance Technology in the People\u2019s Republic of China","author":"G Walton","year":"2001","unstructured":"Walton, G.: China\u2019s Golden Shield: Corporations and the Development of Surveillance Technology in the People\u2019s Republic of China. International Centre for Human Rights and Democratic Development, Montreal (2001)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:17:38Z","timestamp":1583507858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_22"}},"subtitle":["An Adapted Model"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}