{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:25:08Z","timestamp":1748075108177,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,4,8]],"date-time":"2016-04-08T00:00:00Z","timestamp":1460073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10588-016-9220-6","type":"journal-article","created":{"date-parts":[[2016,4,8]],"date-time":"2016-04-08T18:51:09Z","timestamp":1460141469000},"page":"273-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An agent-based approach to modeling insider threat"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5463-8371","authenticated-orcid":false,"given":"John A.","family":"Sokolowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Catherine M.","family":"Banks","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas J.","family":"Dover","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,4,8]]},"reference":[{"key":"9220_CR5","volume-title":"Management and education of the risk of insider threat (MERIT): system dynamics modeling of computer system sabotage","author":"DM Cappelli","year":"2008","unstructured":"Cappelli DM, Desai AG, Moore AP, Shimeall TJ, Weaver EA, Willke BJ (2008) Management and education of the risk of insider threat (MERIT): system dynamics modeling of computer system sabotage. Software Engineering Institute, Pittsburgh"},{"key":"9220_CR6","volume-title":"The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)","author":"DM Cappelli","year":"2012","unstructured":"Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston"},{"key":"9220_CR1","doi-asserted-by":"crossref","unstructured":"Chinchani R et al (2005) Towards a theory of insider threat assessment. In: IEEE proceedings of the international conference on dependable systems and networks, Yokohama. Institute of Electrical and Electronics Engineers, Inc., pp 108\u2013117","DOI":"10.1109\/DSN.2005.94"},{"key":"9220_CR29","unstructured":"Deloitte (2012) Mitigating the insider threat: building a secure workforce. http:\/\/csrc.nist.gov\/organizations\/fissea\/2012-conference\/presentations\/fissea-conference-2012_mahoutchian-and-gelles.pdf"},{"key":"9220_CR7","first-page":"28","volume":"19","author":"TJ Dover","year":"2010","unstructured":"Dover TJ (2010) The Offender Interaction Process Model. Forensic Exam 19:28\u201340","journal-title":"Forensic Exam"},{"key":"9220_CR8","doi-asserted-by":"crossref","unstructured":"Eldardiry H, Evgeniy BL, Juan L, Hanley J, Price B, Brdiczka O (2013) Multi-domain information fusion for insider threat detection. In: IEEE CS security and privacy workshop, San Francisco, CA, May 23\u201324. Institute of Electrical and Electronics Engineers, Inc., pp 45\u201351","DOI":"10.1109\/SPW.2013.14"},{"key":"9220_CR9","volume-title":"Agent zero: toward neurocognitive foundations for generative social science","author":"JM Epstein","year":"2013","unstructured":"Epstein JM (2013) Agent zero: toward neurocognitive foundations for generative social science. Princeton University Press, Princeton"},{"key":"9220_CR10","unstructured":"Ethics Resource Center (2013) National Business Ethics Survey of the U. S. Workforce. Ethics Resource Center, Arlington"},{"key":"9220_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10796-010-9265-x","volume":"15","author":"F Farahmand","year":"2013","unstructured":"Farahmand F, Spafford EH (2013) Understanding insiders: an analysis of risk-taking behavior. Inform Syst Front 15:5\u201315","journal-title":"Inform Syst Front"},{"key":"9220_CR14","volume-title":"Predictive modeling for insider threat mitigation","author":"FL Greitzer","year":"2009","unstructured":"Greitzer FL, Paulson PR, Kangas LJ, Franklin LR, Edgar TW, Frincke DA (2009) Predictive modeling for insider threat mitigation. Pacific Northwest Laboratory, Richland"},{"key":"9220_CR15","doi-asserted-by":"crossref","unstructured":"Greitzer FL, Kangas LJ, Noonan CF, Dalton AC, Hohimer RE (2012) Identifying at-risk employees: modeling psychosocial precursors of potential insider threats. In: Sprague R (ed) 45th Hawaii International Conference on System Science, Maui. Institute of Electrical and Electronics Engineers, Inc., pp 2392\u20132401","DOI":"10.1109\/HICSS.2012.309"},{"key":"9220_CR16","volume-title":"Insider threat study: computer sabotage in critical infrastructure sectors","author":"MD Keeney","year":"2005","unstructured":"Keeney MD et al (2005) Insider threat study: computer sabotage in critical infrastructure sectors. CERT Program and Software Engineering Institute, Pittsburgh"},{"key":"9220_CR17","volume-title":"Insider threat study: illicit cyber activity in the government sector","author":"ET Kowalski","year":"2008","unstructured":"Kowalski ET et al (2008) Insider threat study: illicit cyber activity in the government sector. U. S. Secret Service and CERT\/SEI, Washington, DC"},{"key":"9220_CR30","first-page":"20","volume":"4","author":"P Legg","year":"2012","unstructured":"Legg P et al (2012) Towards a conceptual model and reasoning structure for insider threat detection. J Wirel Mobile Netw, Ubiquitous Computing, Dependable Appl 4:20\u201337","journal-title":"J Wirel Mobile Netw, Ubiquitous Computing, Dependable Appl"},{"key":"9220_CR21","doi-asserted-by":"crossref","unstructured":"Munshi AP, Dell P, Armstrong H (2012) Insider threat behavior factors: a comparison of theory and reported incidents. In: 45th Hawaii international conference on system science, Maui, January 4\u20137. Institute of Electrical and Electronics Engineers, Inc., pp 2402\u20132411","DOI":"10.1109\/HICSS.2012.326"},{"key":"9220_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen N, Reiher P, Kuenning GH (2003) Detecting insider threats by monitoring system call activity. In: 2003 IEEE workshop on information assurance, United States Military Academy, West Point, June 18\u201320. IEEE Systems, Man and Cybernetics Society. IEEE, pp 45\u201352","DOI":"10.1109\/SMCSIA.2003.1232400"},{"key":"9220_CR23","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1002\/9780470590621.ch10","volume-title":"Modeling and simulation fundamentals: theoretical underpinnings and practical domains","author":"MD Petty","year":"2010","unstructured":"Petty MD (2010) Verification, Validation, and Accreditation. In: Sokolowski JA, Banks CM (eds) Modeling and simulation fundamentals: theoretical underpinnings and practical domains. John Wiley and Sons Inc, Hoboken, pp 325\u2013372"},{"key":"9220_CR24","unstructured":"Phyo AH, Furnell SM (2004) A detection-oriented classification of insider IT misuse. Paper presented at the Third Security Conference, Las Vegas, NV"},{"key":"9220_CR25","volume-title":"spotlight on insider theft of intellectual property inside the U. S. involving Foreign Governments Or Organizations","author":"D Spooner","year":"2013","unstructured":"Spooner D et al (2013) spotlight on insider theft of intellectual property inside the U. S. involving Foreign Governments Or Organizations. CERT, Pittsburgh"},{"key":"9220_CR26","unstructured":"United States Secret Service National Threat Assessment Center (2004) Insider threat study: illicit cyber-activity in the banking and finance sector. http:\/\/www.secretservice.gov\/ntac\/its_report_040820.pdf"},{"key":"9220_CR27","volume-title":"NetLogo. Center for connected learning and computer-based modeling","author":"U Welinsky","year":"1999","unstructured":"Welinsky U (1999) NetLogo. Center for connected learning and computer-based modeling. Northwestern University, Evanston"},{"key":"9220_CR28","series-title":"RAND Publications","first-page":"41","volume-title":"Research on mitigating the insider threat to information systems","author":"BJ Wood","year":"2000","unstructured":"Wood BJ (2000) An insider threat model for adversary simulation. In: Anderson RH, Bozek T, Longstaff T, Meitzler W, Skroch M, Van Wyk K (eds) Research on mitigating the insider threat to information systems, vol 2., RAND PublicationsSanta Monica, CA, pp 41\u201348"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-016-9220-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-016-9220-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-016-9220-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T07:36:27Z","timestamp":1559288187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-016-9220-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,8]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["9220"],"URL":"https:\/\/doi.org\/10.1007\/s10588-016-9220-6","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2016,4,8]]}}}