{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:02:30Z","timestamp":1778788950736,"version":"3.51.4"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011038","name":"Office of the Director of National Intelligence","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011039","name":"Intelligence Advanced Research Projects Activity","doi-asserted-by":"publisher","award":["2016-16031500006"],"award-info":[{"award-number":["2016-16031500006"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tem.2021.3059240","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T19:59:35Z","timestamp":1625169575000},"page":"3838-3847","source":"Crossref","is-referenced-by-count":10,"title":["Eye-Tracking Active Indicators of Insider Threats: Detecting Illicit Activity During Normal Workflow"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3670-9890","authenticated-orcid":false,"given":"Valarie A.","family":"Yerdon","sequence":"first","affiliation":[{"name":"Department of Psychology, Human Factors and Cognitive Psychology Program, University of Central Florida, Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinchao","family":"Lin","sequence":"additional","affiliation":[{"name":"Institute of Simulation and Training, University of Central Florida, Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryan W","family":"Wohleber","sequence":"additional","affiliation":[{"name":"SoarTech, Inc., Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gerald","family":"Matthews","sequence":"additional","affiliation":[{"name":"Institute of Simulation and Training, University of Central Florida, Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lauren","family":"Reinerman-Jones","sequence":"additional","affiliation":[{"name":"Department of Human Factors, University of Central Florida, Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4936-066X","authenticated-orcid":false,"given":"P. A.","family":"Hancock","sequence":"additional","affiliation":[{"name":"Department of Psychology, Human Factors and Cognitive Psychology Program, University of Central Florida, Orlando, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"2","article-title":"Best practices for mitigating insider threat: Lessons learned from 250 cases","author":"cappelli","year":"0","journal-title":"Proc RSA Conf"},{"key":"ref38","first-page":"5","article-title":"Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach","volume":"14","author":"miranda","year":"2018","journal-title":"International Journal of Management Reviews"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.11.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41932-9_22"},{"key":"ref30","article-title":"The top 10 cybersecurity threats for financial institutions","author":"user","year":"2016"},{"key":"ref37","first-page":"17","article-title":"Masquerade attack detection using a search-behavior modeling approach","author":"salem","year":"2009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_17"},{"key":"ref35","article-title":"Cybersecurity Compliance in the financial sector","volume":"20","author":"mohammed","year":"2015","journal-title":"J Internet Bank Commer"},{"key":"ref34","first-page":"14","article-title":"Evaluating Cybersecurity Vulnerabilities with the Email Testbed: Effects of Training","volume":"9","author":"sawyer","year":"0","journal-title":"Proc 19th Triennial Congr IEA"},{"key":"ref10","first-page":"39","article-title":"Modeling insider threat from the inside and outside: individual and environmental factors examined using event history analysis","author":"zimmerman","year":"2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205925"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.05"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/23744006.2015.1060080"},{"key":"ref13","first-page":"4","article-title":"Mean map-detecting identity deception based on behavioral and neurophysiological pattern measurements of the truth tellers and liars","author":"tarja","year":"2012","journal-title":"Proc Rapid Screening Technol Deception Detection Credibility Assessment Symp"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2808783.2808792"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/00332747.1969.11023575"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60369-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1981.tb34477.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511975196.017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2172\/1088910"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1097\/WCO.0000000000000055"},{"key":"ref3","article-title":"Insider threat study: Illicit cyber activity in the banking and finance sector","author":"randazzo","year":"2005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/0018720814539505"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897799"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21236\/ADA585500"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2016.06.020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21236\/ADA610587"},{"key":"ref7","article-title":"A focus on insider threats in banking and financial institutions","author":"bunn","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3"},{"key":"ref1","article-title":"2011 cybersecurity watch survey","year":"2011"},{"key":"ref9","article-title":"IT threat evolution in Q2 2015","author":"emm","year":"2015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1037\/1528-3542.2.4.315"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.995535"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.12.6.2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.00381"},{"key":"ref47","article-title":"Development of a multidimensional workload rating scale: Results of empirical and theoretical research","volume":"52","author":"hart","year":"1988","journal-title":"Human Mental Workload"},{"key":"ref21","article-title":"Cybercrime: Protecting against the growing threat","author":"beer","year":"2012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-007-9110-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0059-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/17470910802507660"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2012.1"},{"key":"ref26","first-page":"1","article-title":"The four horsemen of automaticity: Awareness, intention, efficiency, and control in social cognition","volume":"1","author":"bargh","year":"1994","journal-title":"Handbook of Social Cognition"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290410"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1981.tb34479.x"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/9993768\/09469217.pdf?arnumber=9469217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T17:29:17Z","timestamp":1671730157000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9469217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":47,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tem.2021.3059240","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}