{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:30Z","timestamp":1725562410265},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_41","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"501-507","source":"Crossref","is-referenced-by-count":4,"title":["Towards a Social Network Approach for Monitoring Insider Threats to Information Security"],"prefix":"10.1007","author":[{"given":"Anand","family":"Natarajan","sequence":"first","affiliation":[]},{"given":"Liaquat","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"41_CR1","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1145\/322796.322817","volume":"42","author":"P. Neumann","year":"1999","unstructured":"Neumann, P.: Risks of Insiders. Communications of the ACM\u00a042(12), 160 (1999)","journal-title":"Communications of the ACM"},{"key":"41_CR2","unstructured":"NSTISSC (July 1999). The Insider Threat to US Government Information Systems. Retrieved on February 01 (2004), URL: \n                      \n                        http:\/\/www.nstissc.gov\/Assets\/pdf\/NSTISSAM_INFOSEC1-99.pdf"},{"key":"41_CR3","unstructured":"Hanneman, R.A.: Introduction to Social Network Method. Retrieved on January 28, 2004 (2001), \n                      \n                        http:\/\/faculty.ucr.edu\/~hanneman\/SOC157\/NETTEXT.PDF"},{"issue":"6","key":"41_CR4","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M. Granovetter","year":"1973","unstructured":"Granovetter, M.: The Strength of Weak Ties. The American Journal of Sociology\u00a078(6), 1360\u20131380 (1973)","journal-title":"The American Journal of Sociology"},{"issue":"2","key":"41_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.2307\/2393923","volume":"42","author":"R.S. Burt","year":"1997","unstructured":"Burt, R.S.: The contingent value of social capital. Administrative Science Quarterly\u00a042(2), 339\u2013365 (1997)","journal-title":"Administrative Science Quarterly"},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/202050","volume":"1","author":"B. Wellman","year":"1983","unstructured":"Wellman, B.: Network Analysis: Some Basic principles. Sociological Theory\u00a01, 155\u2013200 (1983)","journal-title":"Sociological Theory"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:39Z","timestamp":1620011919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}