{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:46Z","timestamp":1759091206282},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T00:00:00Z","timestamp":1457481600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10588-016-9210-8","type":"journal-article","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T08:33:13Z","timestamp":1457512393000},"page":"261-272","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Introduction to the special issue on insider threat modeling and simulation"],"prefix":"10.1007","volume":"22","author":[{"given":"Andrew P.","family":"Moore","sequence":"first","affiliation":[]},{"given":"Kirk A.","family":"Kennedy","sequence":"additional","affiliation":[]},{"given":"Thomas J.","family":"Dover","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"key":"9210_CR1","volume-title":"The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)","author":"DM Cappelli","year":"2012","unstructured":"Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston"},{"key":"9210_CR2","first-page":"206","volume":"12","author":"KM Carley","year":"2002","unstructured":"Carley KM (2002) Smart agents and organizations of the future. Handb New Media 12:206\u2013220","journal-title":"Handb New Media"},{"key":"9210_CR3","first-page":"133","volume-title":"Dynamic network analysis. Dynamic social network modeling and analysis: workshop summary and papers","author":"KM Carley","year":"2003","unstructured":"Carley KM (2003) Dynamic network analysis. Dynamic social network modeling and analysis: workshop summary and papers. Committee on Human Factors, National Research Council, Washington, pp 133\u2013145"},{"key":"9210_CR4","unstructured":"Carley KM (2006) A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. DTIC Document"},{"key":"9210_CR41","unstructured":"CERT Insider Threat Team (2013) Unintentional insider threats: a foundational study. Technical Report CMU\/SEI-2013-TN-022, Software Engineering Institute, Pittsburgh"},{"key":"9210_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5661-1","volume-title":"Introduction to computational social science: principles and applications","author":"C Cioffi-Revilla","year":"2014","unstructured":"Cioffi-Revilla C (2014) Introduction to computational social science: principles and applications. Springer, London and Heidelberg"},{"issue":"6","key":"9210_CR6","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/S0167-4048(99)80115-1","volume":"18","author":"F Cohen","year":"1999","unstructured":"Cohen F (1999) Simulating cyber attacks, defences, and consequences. Comput Secur 18(6):479\u2013518","journal-title":"Comput Secur"},{"key":"9210_CR7","first-page":"682","volume":"5","author":"NS Contractor","year":"2011","unstructured":"Contractor NS, Monge PR, Leonardi PM (2011) Multidimensional networks and the dynamics of sociomateriality: bringing technology inside the network. Int J Commun 5:682\u2013720","journal-title":"Int J Commun"},{"key":"9210_CR8","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2009.111","volume":"6","author":"F Duran","year":"2009","unstructured":"Duran F, Conrad SH, Conrad GN, Duggan DP, Held EB (2009) Building a system for insider security. IEEE Secur Priv 6:30\u201338","journal-title":"IEEE Secur Priv"},{"key":"9210_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3374.001.0001","volume-title":"Growing artificial societies: social science from the bottom up","author":"JM Epstein","year":"1996","unstructured":"Epstein JM, Axtell R (1996) Growing artificial societies: social science from the bottom up. Brookings Institution Press, Washington"},{"key":"9210_CR10","volume-title":"The development of social network analysis: a study in the sociology of science","author":"LC Freeman","year":"2004","unstructured":"Freeman LC (2004) The development of social network analysis: a study in the sociology of science. Empirical Press, Vancouver"},{"key":"9210_CR12","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983259","volume-title":"Agent-based models","author":"N Gilbert","year":"2008","unstructured":"Gilbert N (2008) Agent-based models. SAGE Publications Inc, New York"},{"issue":"3","key":"9210_CR13","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/j.dss.2004.06.004","volume":"41","author":"M Gupta","year":"2006","unstructured":"Gupta M, Rees J, Chaturvedi A, Chi J (2006) Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis Support Syst 41(3):592\u2013603","journal-title":"Decis Support Syst"},{"key":"9210_CR14","unstructured":"Herbig KL (2008) Changes in Espionage by Americans, 1947\u20132007 (PERSEREC Technical Report No. 08-05). Defense Personnel and Security Research Center (PERSEREC). Retrieved from https:\/\/www.scribd.com\/doc\/192035027\/Katherine-L-Herbig-Changes-in-Espionage-by-Americans-1947-2007-Technical-Report-08-05-Northrop-Grumman-March-2008"},{"key":"9210_CR15","volume-title":"The failure of risk management","author":"DW Hubbard","year":"2009","unstructured":"Hubbard DW (2009) The failure of risk management. Wiley, Hoboken"},{"key":"9210_CR16","unstructured":"INSA (2013) A preliminary examination of insider threat programs in the U.S. Private Sector. Intelligence and national security alliance. Retrieved from http:\/\/www.insaonline.org\/i\/d\/a\/b\/InsiderThreat_embed.aspx"},{"key":"9210_CR17","doi-asserted-by":"crossref","unstructured":"Kandias M, Mylonas A, Virvilis N, Theoharidou M, Gritzalis D (2010) An insider threat prediction model. In Katsikas S, Lopez J, Soriano M (eds) Trust, privacy and security in digital business. Springer, Berlin Heidelberg, p 26\u201337 Retrieved from http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-15152-1_3","DOI":"10.1007\/978-3-642-15152-1_3"},{"key":"9210_CR18","unstructured":"Lanham MJ (2015) Rapid mission assurance assessment via sociotechnical modeling and simulation. Dissertations. Paper 536"},{"key":"9210_CR19","doi-asserted-by":"crossref","unstructured":"Lanham MJ, Morgan GP, Carley KM (2011) Data-driven diffusion modeling to examine deterrence. In: IEEE presented at the network science workshop (NSW), 2011, p 1\u20138","DOI":"10.1109\/NSW.2011.6004651"},{"key":"9210_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511778278","volume-title":"Von Neumann, Morgenstern, and the creation of game theory","author":"R Leonard","year":"2010","unstructured":"Leonard R (2010) Von Neumann, Morgenstern, and the creation of game theory. Cambridge University Press, New York"},{"key":"9210_CR21","doi-asserted-by":"crossref","unstructured":"Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE international presented at the requirements engineering conference, p 151\u2013161","DOI":"10.1109\/ICRE.2003.1232746"},{"issue":"2","key":"9210_CR22","doi-asserted-by":"publisher","first-page":"7:1","DOI":"10.1145\/1346325.1346328","volume":"18","author":"IJ Martinez-Moyano","year":"2008","unstructured":"Martinez-Moyano IJ, Rich E, Conrad S, Andersen DF, Stewart TR (2008) A behavioral theory of insider-threat risks: a system dynamics approach. ACM Trans Model Comput Simul 18(2):7:1\u20137:27. doi: 10.1145\/1346325.1346328","journal-title":"ACM Trans Model Comput Simul"},{"key":"9210_CR23","unstructured":"Moore AP, Carley KM, Collins ML, Altman NW (2015) Social network dynamics of insider threats: a preliminary model. In: Proceedings of the international conference of the system dynamics society. System Dynamics Society, Boston"},{"key":"9210_CR24","volume-title":"Effective insider threat programs: understanding and avoiding potential pitfalls","author":"AP Moore","year":"2015","unstructured":"Moore AP, Novak WE, Collins ML, Trzeciak RF, Theis MC (2015b) Effective insider threat programs: understanding and avoiding potential pitfalls. Software Engineering Institute White Paper, Pittsburgh"},{"key":"9210_CR25","doi-asserted-by":"crossref","DOI":"10.1037\/10648-000","volume-title":"Who shall survive? A new approach to the problem of human interrelations","author":"JL Moreno","year":"1934","unstructured":"Moreno JL (1934) Who shall survive? A new approach to the problem of human interrelations. Nervous and Mental Disease Publishing Co., Beacon House"},{"key":"9210_CR26","volume-title":"Game theory: analysis of conflict","author":"RB Myerson","year":"1991","unstructured":"Myerson RB (1991) Game theory: analysis of conflict. Harvard University Press, Cambridge"},{"key":"9210_CR27","volume-title":"Probabilistic reasoning in expert systems: theory and algorithms","author":"RE Neapolitan","year":"1990","unstructured":"Neapolitan RE (1990) Probabilistic reasoning in expert systems: theory and algorithms. Wiley, New York"},{"key":"9210_CR28","unstructured":"Office of the Press Secretary (2011) Executive Order 13587\u2014Structural reforms to improve the security of classified networks and the responsible sharing and safeguarding of classified information. The White House. https:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"},{"key":"9210_CR29","unstructured":"Pearl J (1985) Bayesian networks; a model of self-activated memory for evidential reasoning. In: Proceedings of the 7th Conference of the Cognitive Science Society, University of California, Irvine, p 329\u2013334"},{"key":"9210_CR30","volume-title":"Probabilistic reasoning in intelligent systems","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent systems. Morgan Kaufman, San Francisco"},{"key":"9210_CR31","volume-title":"Citizen Espionage: studies in trust and betrayal","author":"TR Sarbin","year":"1994","unstructured":"Sarbin TR, Carney RM, Eoyang C (1994) Citizen Espionage: studies in trust and betrayal. Praeger, Westport"},{"key":"9210_CR32","doi-asserted-by":"crossref","unstructured":"Shaw ED, Fischer LF, Rose AE (2009) Insider risk evaluation and audit (No. Technical Report 09-02). Defense Personnel Security Research Center, Monterey","DOI":"10.21236\/ADA563910"},{"key":"9210_CR33","volume-title":"Business dynamics: systems thinking and modeling for a complex world","author":"J Sterman","year":"2000","unstructured":"Sterman J (2000) Business dynamics: systems thinking and modeling for a complex world. Irwin\/McGraw-Hill, New York"},{"key":"9210_CR11","unstructured":"U.S. GAO (2015) Insider threats: DOD should strengthen management and guidance to protect classified systems (No. GAO-15-544). United States Government Accountability Office"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-016-9210-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-016-9210-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-016-9210-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T10:29:55Z","timestamp":1567679395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-016-9210-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["9210"],"URL":"https:\/\/doi.org\/10.1007\/s10588-016-9210-8","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,9]]}}}