{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:29Z","timestamp":1750308209143,"version":"3.41.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2004,6,1]],"date-time":"2004-06-01T00:00:00Z","timestamp":1086048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2004,6]]},"abstract":"<jats:p>Every year corporations and government installations spend millions of dollars fortifying their network infrastructures. Firewalls, intrusion detection systems, and antivirus products stand guard at network boundaries, and individuals monitor countless logs and sensors for even the subtlest hints of network penetration. Vendors and IT managers have focused on keeping the wily hacker outside the network perimeter, but very few technological measures exist to guard against insiders - those entities that operate inside the fortified network boundary. The 2002 CSI\/FBI survey estimates that 70 percent of successful attacks come from the inside. Several other estimates place those numbers even higher.<\/jats:p>","DOI":"10.1145\/1016978.1016983","type":"journal-article","created":{"date-parts":[[2005,1,26]],"date-time":"2005-01-26T16:33:14Z","timestamp":1106757194000},"page":"58-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Insider, Naivety, and Hostility: Security Perfect Storm?"],"prefix":"10.1145","volume":"2","author":[{"given":"Herbert H","family":"Thompson","sequence":"first","affiliation":[{"name":"Security Innovation"}]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2004,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Computer Security Issues and Trends VIII, 1 (Spring","author":"Power R.","year":"2002","unstructured":"1 . Power , R. 2002 CSI\/FBI computer crime and security survey. Computer Security Issues and Trends VIII, 1 (Spring 2002 ). 1. Power, R. 2002 CSI\/FBI computer crime and security survey. Computer Security Issues and Trends VIII, 1 (Spring 2002)."},{"key":"e_1_2_1_2_1","volume-title":"July","author":"Hayden M. V.","year":"1999","unstructured":"2 . Hayden , M. V. The Insider Threat to U. S. Government Information Systems. Report from NSTISSAM INFOSEC \/1-99 , July 1999 . 2. Hayden, M. V. The Insider Threat to U. S. Government Information Systems. Report from NSTISSAM INFOSEC \/1-99, July 1999."},{"key":"e_1_2_1_3_1","unstructured":"3\n  .  Ferrie P. and Lee T. Analysis of W32.Mydoom.A@mm; http:\/\/securityresponse.symantec.com\/avcenter\/venc\/ data\/w32.novarg.a@mm.html.  3. Ferrie P. and Lee T. Analysis of W32.Mydoom.A@mm; http:\/\/securityresponse.symantec.com\/avcenter\/venc\/ data\/w32.novarg.a@mm.html."},{"key":"e_1_2_1_4_1","volume-title":"ICSA Labs 7th Annual Computer Virus Prevalence Survey","author":"Bridwell L.","year":"2001","unstructured":"4 . Bridwell , L. , and Tippett , P . ICSA Labs 7th Annual Computer Virus Prevalence Survey 2001 . ICSA Labs , 2001. 4. Bridwell, L., and Tippett, P. ICSA Labs 7th Annual Computer Virus Prevalence Survey 2001. ICSA Labs, 2001."},{"volume-title":"Microsoft Security Bulletin MS03- 050, Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code To Run: http: \/\/www.microsoft.com\/technet\/security\/bulletin\/MS03- 050.mspx","author":"See","key":"e_1_2_1_5_1","unstructured":"5 . See , for example , Microsoft Security Bulletin MS03- 050, Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code To Run: http: \/\/www.microsoft.com\/technet\/security\/bulletin\/MS03- 050.mspx ; or MS03-035, Flaws in Microsoft Word Could Enable Macros To Run Automatically: http:\/\/www.microsoft.com\/technet\/security\/bulletin\/ MS 03-035.mspx. 5. See, for example, Microsoft Security Bulletin MS03- 050, Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code To Run: http: \/\/www.microsoft.com\/technet\/security\/bulletin\/MS03- 050.mspx; or MS03-035, Flaws in Microsoft Word Could Enable Macros To Run Automatically: http:\/\/www.microsoft.com\/technet\/security\/bulletin\/ MS03-035.mspx."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the First Workshop on Security and Privacy in E-Commerce (Nov.","author":"Dos Santos A.","year":"2000","unstructured":"6 . Dos Santos , A. , Vigna , G. , and Kemmerer , R . Security testing of the online banking service of a large international bank . Proceedings of the First Workshop on Security and Privacy in E-Commerce (Nov. 2000 ). 6. Dos Santos, A., Vigna, G., and Kemmerer, R. Security testing of the online banking service of a large international bank. Proceedings of the First Workshop on Security and Privacy in E-Commerce (Nov. 2000)."},{"key":"e_1_2_1_7_1","volume-title":"Top ten viruses reported to Sophos in 2003","author":"Sophos Corporation","year":"2003","unstructured":"7 . Sophos Corporation . Top ten viruses reported to Sophos in 2003 ; http:\/\/www.sophos.com\/virusinfo\/ topten\/ 2003 12summary.html. 7. Sophos Corporation. Top ten viruses reported to Sophos in 2003; http:\/\/www.sophos.com\/virusinfo\/ topten\/200312summary.html."}],"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1016978.1016983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1016978.1016983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:00Z","timestamp":1750264260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1016978.1016983"}},"subtitle":["Keeping nasties out if only half the battle."],"short-title":[],"issued":{"date-parts":[[2004,6]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,6]]}},"alternative-id":["10.1145\/1016978.1016983"],"URL":"https:\/\/doi.org\/10.1145\/1016978.1016983","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"type":"print","value":"1542-7730"},{"type":"electronic","value":"1542-7749"}],"subject":[],"published":{"date-parts":[[2004,6]]},"assertion":[{"value":"2004-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}