{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:09:22Z","timestamp":1742922562356,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_21","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"309-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis"],"prefix":"10.1007","author":[{"given":"Tesleem","family":"Fagade","sequence":"first","affiliation":[]},{"given":"Theo","family":"Spyridopoulos","sequence":"additional","affiliation":[]},{"given":"Nabeel","family":"Albishry","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"4","key":"21_CR1","first-page":"20","volume":"4","author":"PA Legg","year":"2013","unstructured":"Legg, P.A., et al.: Towards a conceptual model and reasoning structure for insider threat detection. JoWUA 4(4), 20\u201337 (2013)","journal-title":"JoWUA"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-319-39381-0_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"T Fagade","year":"2016","unstructured":"Fagade, T., Tryfonas, T.: Security by compliance? A study of insider threat implications for nigerian banks. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 128\u2013139. Springer, Cham (2016). doi:10.1007\/978-3-319-39381-0_12"},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5038\/1944-0472.4.2.2","volume":"4","author":"FL Greitzer","year":"2011","unstructured":"Greitzer, F.L., Hohimer, R.E.: Modeling human behavior to anticipate insider attacks. J. Strateg. Secur. 4(2), 25 (2011)","journal-title":"J. Strateg. Secur."},{"issue":"2","key":"21_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0167-4048(01)00209-7","volume":"20","author":"G Dhillon","year":"2001","unstructured":"Dhillon, G.: Violation of safeguards by trusted personnel and understanding related information security concerns. Comput. Secur. 20(2), 165\u2013172 (2001)","journal-title":"Comput. Secur."},{"unstructured":"Andersen, D.F., et al.: Preliminary system dynamics maps of the insider cyber-threat problem. In: Proceedings of the 22nd International Conference of the System Dynamics Society (2004)","key":"21_CR5"},{"doi-asserted-by":"crossref","unstructured":"Corriss, L.: Information security governance: integrating security into the organizational culture. In: Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, Austin, Texas, USA, pp. 35\u201341. ACM (2010)","key":"21_CR6","DOI":"10.1145\/1920320.1920326"},{"doi-asserted-by":"crossref","unstructured":"Aurigemma, S., Panko, R.: A composite framework for behavioral compliance within formation security policies. In: Proceedings of the 2012 45th Hawaii International Conference on System Sciences, pp. 3248\u20133257. IEEE Computer Society (2012)","key":"21_CR7","DOI":"10.1109\/HICSS.2012.49"},{"unstructured":"McBride, M., Carter L., Warkentin, M.: Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. Technical report, RTI International (2012)","key":"21_CR8"},{"doi-asserted-by":"crossref","unstructured":"Axelrad, E.T., et al.: A Bayesian network model for predicting insider threats. In: 2013 IEEE Security and Privacy Workshops (SPW). IEEE (2013)","key":"21_CR9","DOI":"10.1109\/SPW.2013.35"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1346325.1346328","volume":"18","author":"IJ Martinez-Moyano","year":"2008","unstructured":"Martinez-Moyano, I.J., et al.: A behavioral theory of insider-threat risks: a system dynamics approach. ACM Trans. Model. Comput. Simul. (TOMACS) 18(2), 7 (2008)","journal-title":"ACM Trans. Model. Comput. Simul. (TOMACS)"},{"key":"21_CR11","first-page":"1","volume":"2","author":"B Wood","year":"2000","unstructured":"Wood, B.: An insider threat model for adversary simulation. SRI Int. Res. Mitig. Insider Threat Inf. Syst. 2, 1\u20133 (2000)","journal-title":"SRI Int. Res. Mitig. Insider Threat Inf. Syst."},{"key":"21_CR12","volume-title":"Insider Threats in Cyber Security","author":"FL Greitzer","year":"2010","unstructured":"Greitzer, F.L., Frincke, D.A.: Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. In: Probst, C.W., Hunker, J., Gollmann, D., Bishop, M. (eds.) Insider Threats in Cyber Security. Springer, US (2010). 85\u2013113"},{"key":"21_CR13","volume-title":"Action Control","author":"I Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action Control. Springer, Berlin (1985). 11\u201339"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-38631-2_17","volume-title":"Network and System Security","author":"M Kandias","year":"2013","unstructured":"Kandias, M., Galbogini, K., Mitrou, L., Gritzalis, D.: Insiders trapped in the mirror reveal themselves in social media. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 220\u2013235. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38631-2_17"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1089\/cyber.2009.0257","volume":"13","author":"S Mehdizadeh","year":"2010","unstructured":"Mehdizadeh, S.: Self-presentation 2.0: narcissism and self-esteem on Facebook. Cyberpsychol. Behav. Soc. Netw. 13(4), 357\u2013364 (2010)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"3","key":"21_CR16","first-page":"260","volume":"65","author":"S Malik","year":"2015","unstructured":"Malik, S., Khan, M.: Impact of Facebook addiction on narcissistic behavior and self-esteem among students. J. Pak. Med. Assoc. 65(3), 260\u2013263 (2015)","journal-title":"J. Pak. Med. Assoc."},{"issue":"6","key":"21_CR17","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.1016\/j.chb.2012.07.012","volume":"28","author":"JL Skues","year":"2012","unstructured":"Skues, J.L., Williams, B., Wise, L.: The effects of personality traits, self-esteem, loneliness, and narcissism on Facebook use among university students. Comput. Hum. Behav. 28(6), 2414\u20132419 (2012)","journal-title":"Comput. Hum. Behav."},{"issue":"98","key":"21_CR18","first-page":"1","volume":"2","author":"E Shaw","year":"1998","unstructured":"Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: the psychology of the dangerous insider. Secur. Awareness Bull. 2(98), 1\u201310 (1998)","journal-title":"Secur. Awareness Bull."},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/S0167-4048(02)01009-X","volume":"21","author":"EE Schultz","year":"2002","unstructured":"Schultz, E.E.: A framework for understanding and predicting insider attacks. Comput. Secur. 21(6), 526\u2013531 (2002)","journal-title":"Comput. Secur."},{"unstructured":"US-CERT \u201cCombating the Insider Threat\u201d, National Cybersecurity and Communications Integration Center, May 2014","key":"21_CR20"},{"doi-asserted-by":"crossref","unstructured":"Cummings, A., et al.: Insider threat study: Illicit cyber activity involving fraud in the US financial services sector. No. CMU\/SEI-2012-SR-004. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst (2012)","key":"21_CR21","DOI":"10.21236\/ADA610430"},{"unstructured":"Kowalski, E., Cappelli, D., Moore, A.: Insider threat study: illicit cyber activity in the information technology and telecommunications sector. Carnegie Mellon University, Software Engineering Institute (2008)","key":"21_CR22"},{"doi-asserted-by":"crossref","unstructured":"Golbeck, J., et al.: Predicting personality from twitter. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom). IEEE (2011)","key":"21_CR23","DOI":"10.1109\/PASSAT\/SocialCom.2011.33"},{"issue":"3","key":"21_CR24","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1177\/0956797609360756","volume":"21","author":"MD Back","year":"2010","unstructured":"Back, M.D., et al.: Facebook profiles reflect actual personality, not self-idealization. Psychol. Sci. 21(3), 372\u2013374 (2010)","journal-title":"Psychol. Sci."},{"doi-asserted-by":"crossref","unstructured":"Alahmadi, B.A., Legg, P.A., Nurse, J.R.C.: Using internet activity profiling for insider-threat detection (2015)","key":"21_CR25","DOI":"10.5220\/0005480407090720"},{"unstructured":"Ackerman, D., Mehrpouyan, H.: Modeling human behavior to anticipate insider attacks via system dynamics. In: Proceedings of the Symposium on Theory of Modeling and Simulation. Society for Computer Simulation International (2016)","key":"21_CR26"},{"doi-asserted-by":"crossref","unstructured":"Greitzer, F.L., Frincke, D.A., Zabriskie, M.: Social\/ethical issues in predictive insider threat monitoring. Inf. Assur. Secur. Ethics Complex Syst.: Interdisc. Perspect 132\u2013161 (2010)","key":"21_CR27","DOI":"10.4018\/978-1-61692-245-0.ch007"},{"issue":"3","key":"21_CR28","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.istr.2010.11.002","volume":"15","author":"KR Sarkar","year":"2010","unstructured":"Sarkar, K.R.: Assessing insider threats to information security using technical, behavioural and organisational measures. Inf. Secur. Tech. Rep. 15(3), 112\u2013133 (2010)","journal-title":"Inf. Secur. Tech. Rep."},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Leveraging social networks to detect anomalous insider actions in collaborative environments. In: 2011 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE (2011)","key":"21_CR29","DOI":"10.1109\/ISI.2011.5984061"},{"unstructured":"SANS Technology Institute, The 6 Categories of Critical Log Information. http:\/\/www.sans.edu\/cyber-research\/security-laboratory\/article\/sixtoplogcategories. Accessed 06 Jan 2017","key":"21_CR30"},{"key":"21_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-15152-1_3","volume-title":"Trust, Privacy and Security in Digital Business","author":"M Kandias","year":"2010","unstructured":"Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An insider threat prediction model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 26\u201337. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15152-1_3"},{"doi-asserted-by":"crossref","unstructured":"Kandias, M., et al.: Proactive insider threat detection through social media: the YouTube case. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society. ACM (2013)","key":"21_CR32","DOI":"10.1145\/2517840.2517865"},{"unstructured":"Kowalski, E., et al.: Insider threat study: illicit cyber activity in the government sector. In: US Department of Homeland Security, US Secret Service, CERT, and the Software Engineering Institute (Carnegie Mellon University), Technical report (2008)","key":"21_CR33"},{"issue":"1","key":"21_CR34","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1037\/0021-843X.107.1.3","volume":"107","author":"BP O\u2019Connor","year":"1998","unstructured":"O\u2019Connor, B.P., Dyce, J.A.: A test of models of personality disorder configuration. J. Abnorm. Psychol. 107(1), 3 (1998)","journal-title":"J. Abnorm. Psychol."},{"issue":"2","key":"21_CR35","doi-asserted-by":"publisher","first-page":"528","DOI":"10.2466\/21.09.PR0.114k23w6","volume":"114","author":"B Caci","year":"2014","unstructured":"Caci, B., et al.: Personality variables as predictors of Facebook usage. Psychol. Rep. 114(2), 528\u2013539 (2014)","journal-title":"Psychol. Rep."},{"issue":"1","key":"21_CR36","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jcss.2013.03.008","volume":"80","author":"A Ortigosa","year":"2014","unstructured":"Ortigosa, A., Carro, R.M., Quiroga, J.I.: Predicting user personality by mining social interactions in Facebook. J. Comput. Syst. Sci. 80(1), 57\u201371 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"21_CR37","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1108\/09685220910944759","volume":"17","author":"M Styles","year":"2009","unstructured":"Styles, M., Tryfonas, T.: Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end-users. Inf. Manag. Comput. Secur. 17(1), 44\u201352 (2009)","journal-title":"Inf. Manag. Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:58:02Z","timestamp":1625104682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}