{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:20:51Z","timestamp":1763580051006},"reference-count":11,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2001,12,1]],"date-time":"2001-12-01T00:00:00Z","timestamp":1007164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,12]]},"DOI":"10.1016\/s0167-4048(01)00813-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T10:08:03Z","timestamp":1027591683000},"page":"715-723","source":"Crossref","is-referenced-by-count":71,"title":["Computer crimes: theorizing about the enemy within"],"prefix":"10.1016","volume":"20","author":[{"given":"Gurpreet","family":"Dhillon","sequence":"first","affiliation":[]},{"given":"Steve","family":"Moores","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)00813-6_BIB1","unstructured":"Baskerville, R., Designing information systems security, John Wiley & Sons, New York, 1988."},{"key":"10.1016\/S0167-4048(01)00813-6_BIB2","doi-asserted-by":"crossref","unstructured":"Dhillon, G., Managing information system security, Macmillan, London, 1997.","DOI":"10.1007\/978-1-349-14454-9"},{"key":"10.1016\/S0167-4048(01)00813-6_BIB3","doi-asserted-by":"crossref","unstructured":"Dhillon, G., Managing and controlling computer misuse, Information Management & Computer Security, 7, 5, (1999).","DOI":"10.1108\/09685229910292664"},{"key":"10.1016\/S0167-4048(01)00813-6_BIB4","doi-asserted-by":"crossref","unstructured":"Dhillon, G., \u201cPrinciples for managing information security in the new millennium,\u201d in Dhillon, G., ed., Information security management: global challenges in the new millennium, Hershey: Idea Group, 2001, p. 173\u2013177.","DOI":"10.4018\/978-1-878289-78-0.ch012"},{"key":"10.1016\/S0167-4048(01)00813-6_BIB5","doi-asserted-by":"crossref","unstructured":"Dhillon, G., Violation of safeguards by trusted personnel and understanding related information security concerns, Computers & Security, 20, 2, (2001), 165\u2013172.","DOI":"10.1016\/S0167-4048(01)00209-7"},{"key":"10.1016\/S0167-4048(01)00813-6_BIB6","doi-asserted-by":"crossref","unstructured":"Greenwald, J., Jack in the box, Time, 1994.","DOI":"10.2307\/1447016"},{"key":"10.1016\/S0167-4048(01)00813-6_BIB7","unstructured":"Greenwald, J., A blown billion, Time, 1995."},{"key":"10.1016\/S0167-4048(01)00813-6_BIB8","unstructured":"Hirsch, M., Tossed out, Newsweek, 1995, p.42\u201346."},{"key":"10.1016\/S0167-4048(01)00813-6_BIB9","unstructured":"Pare, T.P., Nightmare on Wall Street, Fortune, 1994, p.40\u201348."},{"key":"10.1016\/S0167-4048(01)00813-6_BIB10","unstructured":"Parker, D., \u201cSeventeen information security myths debunked,\u201d in Dittrich, K., Rautakivi, S., and Saari, J., ed., Computer Security and Information Integrity, Amsterdam: Elsevier Science Publishers, 1991, p.363\u2013370."},{"key":"10.1016\/S0167-4048(01)00813-6_BIB11","unstructured":"Smart, T., Wall Street\u2019s bitter lessons for GE, Business Week, 1994."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801008136?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801008136?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T01:45:52Z","timestamp":1578447952000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801008136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2001,12]]}},"alternative-id":["S0167404801008136"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)00813-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,12]]}}}