{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:52:02Z","timestamp":1743144722939,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_56","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"631-641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research"],"prefix":"10.1007","author":[{"given":"Ulrike","family":"Hugl","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"56_CR1","unstructured":"PwC, Key findings from the 2013 US State of Cybercrime Survey, pp. 1\u201320. PricewaterhouseCoopers (co-sponsored by: CERT\/Carnegie Mellon University, CSO Magazine, United States Secret Service), June 2013"},{"key":"56_CR2","unstructured":"KPMG, Global profiles of the fraudster, pp. 1\u2013124. KPMG International (Headquarters), Amstelveen, November 2013"},{"key":"56_CR3","unstructured":"CPNI, CPNI Insider Data Collection Study. Report of Main Findings, pp. 1\u201315. Centre for the Protection of National Infrastructure, UK (2013)"},{"key":"56_CR4","unstructured":"PWC, Global Econoic Crime Survey 2014, pp. 1\u2013860. PricewaterhouseCoopers (2014)"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Verizon, 2014 Data Breach Investigations Report, pp. 1\u201360. Verizon, USA (2014)","DOI":"10.1016\/S1361-3723(14)70485-3"},{"key":"56_CR6","volume-title":"The CERT Buide to Insider Threat","author":"D Capelli","year":"2012","unstructured":"Capelli, D., Moore, A., Trzeciak, R.: The CERT Buide to Insider Threat. Pearson, Westford (2012)"},{"key":"56_CR7","unstructured":"Flynn, L., Porter, G., DiFatta, C.: Cloud Service Provider Methods for Managing Insider Threats: Analysis Phase II, Expanded Analysis and Recommendations, pp. 1\u201346. Technical Report, CMU\/SEI-2013-TN-030, CERT Division, Carnegie Mellon University (2014)"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Padayachee, K.: A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat: Towards Best Practice. UNISA (University of South Africa) (2014)","DOI":"10.1109\/ISSA.2015.7335064"},{"issue":"3","key":"56_CR9","first-page":"219","volume":"9","author":"MR Grimaila","year":"2012","unstructured":"Grimaila, M.R., et al.: Design and analysis of a dynamically configured log-based distributed security event detection methodology. J. Def. Model. Simul. Appl. Methodol. Technol. 9(3), 219\u2013241 (2012)","journal-title":"J. Def. Model. Simul. Appl. Methodol. Technol."},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Silowash, G.J., King, C.: Insider Threat Control: Understanding Data Loss Prevention (DLP) and Detection by Correlating Events from Multiple Sources. Carnegie Mellon University\/Software Engineering Institute, Research Showcase (paper 708) (2013)","DOI":"10.21236\/ADA610587"},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"Silowash, G.J., Lewellen, T.: Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders, pp. 1\u201335. Carnegie Mellon University\/Software Engineering Institute, Research Showcase (paper 728) (2013)","DOI":"10.21236\/ADA610588"},{"issue":"1","key":"56_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/S0167-4048(02)00109-8","volume":"21","author":"GB Magklaras","year":"2001","unstructured":"Magklaras, G.B., Furnell, S.M.: Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Comput. Secur. 21(1), 62\u201373 (2001)","journal-title":"Comput. Secur."},{"key":"56_CR13","volume-title":"Fighting Computer Crime: A New Framework for Protecting Information","author":"DB Parker","year":"1998","unstructured":"Parker, D.B.: Fighting Computer Crime: A New Framework for Protecting Information. Wiley, New York (1998)"},{"key":"56_CR14","first-page":"305","volume-title":"Strategic Advantage of Computing Information Systems in Enterprise Management","author":"U Hugl","year":"2010","unstructured":"Hugl, U.: The malicious insider: approaching organizational crisis management, culture and management\u2019s role on employees\u2019 behaviour. In: Sarrafzadeh, M., Petratos, P. (eds.) Strategic Advantage of Computing Information Systems in Enterprise Management, pp. 305\u2013316. Athens Institute for Education and Research (ATINER), Athens (2010)"},{"issue":"4","key":"56_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2008.87","volume":"6","author":"J Predd","year":"2008","unstructured":"Predd, J., et al.: Insiders behaving badly. IEEE Secur. Priv. 6(4), 66\u201370 (2008)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"56_CR16","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1086\/228750","volume":"93","author":"JW Coleman","year":"1987","unstructured":"Coleman, J.W.: Toward an integrated theory of white-collar crime. Am. J. Sociol. 93(2), 406\u2013439 (1987)","journal-title":"Am. J. Sociol."},{"key":"56_CR17","first-page":"135","volume-title":"Wirtschaftskriminalit\u00e4t und Ethik","author":"H Schneider","year":"2008","unstructured":"Schneider, H.: Person und Situation. \u00dcber die Bedeutung personaler und situativer Risikofaktoren bei wirtschaftskriminellem Handeln. In: L\u00f6hr, A., Burkatzki, E. (eds.) Wirtschaftskriminalit\u00e4t und Ethik, pp. 135\u2013153. Hampp, M\u00fcnchen\/Mering (2008)"},{"key":"56_CR18","first-page":"4","volume-title":"Der: Wirtschaftsstraft\u00e4ter in seinen sozialen Bez\u00fcgen. Aktuelle Forschungsergebnisse und Konsequenzen f\u00fcr die Unternehmenspraxis","author":"H Schneider","year":"2009","unstructured":"Schneider, H.: Der Wirtschaftsstraft\u00e4ter in seinen sozialen Bez\u00fcgen. In: R\u00f6lfsPartner, (ed.) Der: Wirtschaftsstraft\u00e4ter in seinen sozialen Bez\u00fcgen. Aktuelle Forschungsergebnisse und Konsequenzen f\u00fcr die Unternehmenspraxis, pp. 4\u201319. Universit\u00e4t Leipzig, Leipzig (2009)"},{"key":"56_CR19","first-page":"418","volume-title":"Kriminologie","author":"H Schneider","year":"2008","unstructured":"Schneider, H.: Wirtschaftskriminalit\u00e4t (\u00a725 ). In: Bock, M. (ed.) Kriminologie, pp. 418\u2013436. C.H Beck, M\u00fcnchen (2008)"},{"key":"56_CR20","unstructured":"Homann, D.: Betrug in der gesetzlichen Krankenversicherung. Eine empirische Untersuchung \u00fcber verm\u00f6genssch\u00e4digendes Fehlverhalten zulasten der Solidargemeinschaft, Godesberg, M\u00f6nchengladbach (2009)"},{"key":"56_CR21","unstructured":"Cleff, T., et al.: Wirtschaftskriminalit\u00e4t. Eine Analyse der Motivstrukturen, pp. 1\u201354. PricewaterhouseCoopers (PWC) (2009)"},{"key":"56_CR22","doi-asserted-by":"publisher","first-page":"672","DOI":"10.2307\/2084686","volume":"3","author":"R Merton","year":"1938","unstructured":"Merton, R.: Social structure and anomie. Am. Sociol. Rev. 3, 672\u2013682 (1938)","journal-title":"Am. Sociol. Rev."},{"key":"56_CR23","volume-title":"Causes of Delinquency","author":"T Hirschi","year":"1969","unstructured":"Hirschi, T.: Causes of Delinquency. University of California Press, Berkeley (1969)"},{"key":"56_CR24","doi-asserted-by":"crossref","DOI":"10.1515\/9781503621794","volume-title":"A General Theory of Crime","author":"MR Gottfredson","year":"1990","unstructured":"Gottfredson, M.R., Hirschi, T.: A General Theory of Crime. Standford University Press, Standford (1990)"},{"issue":"4","key":"56_CR25","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach. Am. Sociol. Rev. 44(4), 588\u2013608 (1979)","journal-title":"Am. Sociol. Rev."},{"key":"56_CR26","volume-title":"The Criminology of White-Collar Crime","author":"N Leeper Piquero","year":"2009","unstructured":"Leeper Piquero, N., Weisburd, D.: Developmental trajectories of white-collar crime. In: Simpson, S.S., Weisburd, D. (eds.) The Criminology of White-Collar Crime. Springer, New York (2009)"},{"issue":"1","key":"56_CR27","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1093\/bjc\/azp067","volume":"50","author":"MV Koppen van","year":"2010","unstructured":"van Koppen, M.V., et al.: Criminal trajectories in organized crime. Br. J. Criminol. 50(1), 102\u2013123 (2010)","journal-title":"Br. J. Criminol."},{"issue":"3","key":"56_CR28","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1177\/0011128711405005","volume":"58","author":"N Leeper Piquero","year":"2012","unstructured":"Leeper Piquero, N.: The Only thing we have to fear is fear itself: investigating the relationship between fear of falling and white-collar crime. Crime Delinquency 58(3), 362\u2013379 (2012)","journal-title":"Crime Delinquency"},{"issue":"1","key":"56_CR29","first-page":"30","volume":"6","author":"T Buzzell","year":"2005","unstructured":"Buzzell, T.: Holiday revelry and legal control of fireworks: a study of neutralization in two normative contexts. West. Criminol. Rev. 6(1), 30\u201342 (2005)","journal-title":"West. Criminol. Rev."},{"key":"56_CR30","volume-title":"Essential Criminology","author":"M Lanier","year":"2004","unstructured":"Lanier, M., Henry, S.: Essential Criminology. Westview Press, Boulder (2004)"},{"key":"56_CR31","doi-asserted-by":"publisher","first-page":"664","DOI":"10.2307\/2089195","volume":"22","author":"GM Sykes","year":"1957","unstructured":"Sykes, G.M., Matza, D.: Techniques of neutralization: a theory of delinquency. Am. Sociol. Rev. 22, 664\u2013670 (1957)","journal-title":"Am. Sociol. Rev."},{"key":"56_CR32","volume-title":"The Criminal Elite: Understanding White-Collar Crime","author":"JW Coleman","year":"2006","unstructured":"Coleman, J.W.: The Criminal Elite: Understanding White-Collar Crime. Worth, New York (2006)"},{"key":"56_CR33","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1080\/713840271","volume":"24","author":"P Cromwell","year":"2003","unstructured":"Cromwell, P., Thurman, Q.: The devil made me do it: use of neutralizations by shoplifters. Deviant Behav. 24, 535\u2013550 (2003)","journal-title":"Deviant Behav."},{"key":"56_CR34","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-0-387-09502-8_3","volume-title":"The Criminology of White-Collar Crime","author":"R Agnew","year":"2009","unstructured":"Agnew, R., Piqueroleeper, N., Cullen, F.T.: General strain theory and white-collar crime. In: Simpson, S.S., Weisburd, D. (eds.) The Criminology of White-Collar Crime, pp. 35\u201360. Springer, New York (2009)"},{"key":"56_CR35","unstructured":"NCCIC, Combating the Insider Threat, pp. 1\u20135. National Cybersecurity and Communications Integration Center (NCCIC\/Homeland Security), Washington, D.C., May 2014"},{"issue":"2","key":"56_CR36","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"56_CR37","volume-title":"Situational Crime Prevention: Successful Case Studies","author":"RV Clarke","year":"1997","unstructured":"Clarke, R.V.: Situational Crime Prevention: Successful Case Studies. Criminal Justice Press, Monsey (1997)"},{"key":"56_CR38","volume-title":"The Politics and Practice of Situational Crime Prevention","author":"R Homel","year":"1996","unstructured":"Homel, R.: The Politics and Practice of Situational Crime Prevention. Criminal Justice Press, Monsey (1996)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T14:51:56Z","timestamp":1652885516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}