{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T12:33:34Z","timestamp":1648730014854},"reference-count":26,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","funder":[{"name":"Ministry of Science, ICT and Future Planning, Republic of Korea","award":["IITP-2015-H8501-15-1003"],"award-info":[{"award-number":["IITP-2015-H8501-15-1003"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1121617","type":"journal-article","created":{"date-parts":[[2016,1,5]],"date-time":"2016-01-05T14:34:51Z","timestamp":1452004491000},"page":"405-413","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Advanced Risk Measurement Approach to Insider Threats in Cyberspace"],"prefix":"10.32604","volume":"22","author":[{"given":"Inhyun","family":"Cho","sequence":"first","affiliation":[]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"CIT0001","volume-title":"Research on mitigating the insider threat to information systems-# 2 (No. RAND-CF-163-DARPA)","author":"Anderson R. H.","year":"2000"},{"key":"CIT0004","volume-title":"Common sense guide to prevention and detection of insider threats 3rd edition 1003)","author":"Cappelli D.","year":"2009"},{"key":"CIT0006","first-page":"111","volume":"1","author":"Cho I.","year":"2015","journal-title":"Research Briefs on Information & Communication Technology Evolution"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2014.24.4.681"},{"key":"CIT0008","volume-title":"Characterizing cyberspace: past, present and future","author":"Clark D.","year":"2010"},{"key":"CIT0009","author":"EU Commission","year":"2008","journal-title":"Official Journal of the European Union"},{"key":"CIT0011","volume-title":"Neuromancer","author":"Gibson W.","year":"1984"},{"key":"CIT0012","first-page":"1","author":"Hathaway M. E.","year":"2012","journal-title":"Preliminary considerations: On national cyber security, A.(red.)"},{"key":"CIT0013","volume-title":"Implementing the ISO\/IEC 27001 information security management system standard","author":"Humphreys E.","year":"2007"},{"key":"CIT0014","volume-title":"Global Fraud Report 2013-2014","author":"Kroll","year":"2014"},{"key":"CIT0015","first-page":"82","volume":"118","author":"Lee S.","year":"2008","journal-title":"IT Standard & Test TTA Journal"},{"key":"CIT0016","volume-title":"Insider threat spotlight report 2015","author":"LinkedIn Group Partners","year":"2015"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7133-3"},{"key":"CIT0019","volume-title":"2012 global economic crime survey","author":"PwC","year":"2012"},{"key":"CIT0020","volume-title":"Global state of information security survey 2016","author":"PwC","year":"2015"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7133-3"},{"key":"CIT0022","volume-title":"Insider threat study: Illicit cyber activity in the banking and finance sector","author":"Randazzo M. R.","year":"2005"},{"key":"CIT0023","volume-title":"Cyber terrain: A model for increased understanding of cyber activity","author":"Riley S.","year":"2014"},{"key":"CIT0024","volume-title":"\ubcf4\uc548 \uacbd\uc81c\ud559","author":"Seo S.","year":"2008"},{"key":"CIT0025","volume-title":"A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions (Unpublished master\u2019s thesis)","author":"Sim J.","year":"2014"},{"key":"CIT0026","doi-asserted-by":"crossref","DOI":"10.1515\/9780804775991","volume-title":"Securing freedom in the global commons","author":"Jasper S.","year":"2010"},{"key":"CIT0027","volume-title":"Informaatika teoreetilised alused. Struktuurne aspekt","author":"Lorents P.","year":"2001"},{"key":"CIT0028","author":"United States Army","year":"2010","journal-title":"Cyberspace operations concept capability plan 2016\u20132028"},{"key":"CIT0029","volume-title":"Joint Pub 1\u201302 2009: Department of Defense Dictionary of Military and Associated Terms","author":"United States Department of Defense","year":"2009"},{"key":"CIT0030","volume-title":"Critical infrastructure protection (presidential decision directive 63)","author":"The White House","year":"1998"},{"key":"CIT0031","volume-title":"Cybernetics or control and communication in the animal and the machine (25)","author":"Wiener N.","year":"1965"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1121617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T15:37:00Z","timestamp":1600011420000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1121617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,5]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1121617"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1121617","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}