{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:52Z","timestamp":1750220992548,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T00:00:00Z","timestamp":1560297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,12]]},"DOI":"10.1145\/3322385.3322419","type":"proceedings-article","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T12:09:40Z","timestamp":1560427780000},"page":"122-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Disgruntled yet Deft with IT"],"prefix":"10.1145","author":[{"given":"Laura C.","family":"Amo","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, NY, USA"}]},{"given":"Dianna","family":"Cichocki","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Henry J. (August 21 2018). These 5 Types of Insider Threats Could Lead to Costly Data Breaches. IBM Security Intelligence. Retrieved 3\/1\/2019 from https:\/\/securityintelligence.com\/these-5-types-of-insider-threats-could-lead-to-costly-data-breaches\/  Henry J. (August 21 2018). These 5 Types of Insider Threats Could Lead to Costly Data Breaches. IBM Security Intelligence. Retrieved 3\/1\/2019 from https:\/\/securityintelligence.com\/these-5-types-of-insider-threats-could-lead-to-costly-data-breaches\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Cost of Insider Threats: Global","author":"Ponemon Institute","year":"2018","unstructured":"Ponemon Institute . Cost of Insider Threats: Global . April , 2018 . Ponemon Institute. Cost of Insider Threats: Global. April, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"The frequency and impact of insider collusion","author":"Miller S.","year":"2019","unstructured":"Miller , S. The frequency and impact of insider collusion . Software Engineering Institute, Carnegie Mellon University. Retrieved March 1, 2019 from https:\/\/insights.sei.cmu.edu\/insider-threat\/2016\/06\/the-frequency-and-impact-of-insider-collusion.html Miller, S. The frequency and impact of insider collusion. Software Engineering Institute, Carnegie Mellon University. Retrieved March 1, 2019 from https:\/\/insights.sei.cmu.edu\/insider-threat\/2016\/06\/the-frequency-and-impact-of-insider-collusion.html"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"e_1_3_2_1_5_1","unstructured":"Chuvakin A. (May 9 2016). Our \"Understanding Insider Threats\" Paper Publishes. Retrieved 2\/14\/2019 from https:\/\/blogs.gartner.com\/anton-chuvakin\/2016\/05\/09\/our-understanding-insider-threats-paper-publishes\/  Chuvakin A. (May 9 2016). Our \"Understanding Insider Threats\" Paper Publishes. Retrieved 2\/14\/2019 from https:\/\/blogs.gartner.com\/anton-chuvakin\/2016\/05\/09\/our-understanding-insider-threats-paper-publishes\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Randazzo M.R. Keeney M. Kowalski E. Cappelli D. and Moore A. Insider Threat Study\" Illicit Cyber Activity in the Banking and Finance Sector. CMU-SEI-2004_TR-021.  Randazzo M.R. Keeney M. Kowalski E. Cappelli D. and Moore A. Insider Threat Study\" Illicit Cyber Activity in the Banking and Finance Sector. CMU-SEI-2004_TR-021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"e_1_3_2_1_10_1","first-page":"71","volume-title":"S. Seashore, E. Lawler, P. Mirvis, & C","author":"Cammann C.","unstructured":"Cammann , C. , Fichman , M. Jenkins , D. & Kelsh , J. 1983. Assessing the attitudes and perceptions of organizational members . In S. Seashore, E. Lawler, P. Mirvis, & C . Cammann (Eds.), Assessing organizational change: A guide to methods, measures and practices (pp. 71 -- 138 ). New York, NY : John Wiley. Cammann, C., Fichman, M. Jenkins, D. & Kelsh, J. 1983. Assessing the attitudes and perceptions of organizational members. In S. Seashore, E. Lawler, P. Mirvis, & C. Cammann (Eds.), Assessing organizational change: A guide to methods, measures and practices (pp. 71--138). New York, NY: John Wiley."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings from The Pacific Asia Conference on Information Systems (June","author":"Wang W.","year":"2015","unstructured":"Wang , W. and Zhang , Y .. 2015. From IT satisfaction to job satisfaction: Understanding the role of user-technology fit . In Proceedings from The Pacific Asia Conference on Information Systems (June 2015 ), 154. Wang, W. and Zhang, Y.. 2015. From IT satisfaction to job satisfaction: Understanding the role of user-technology fit. In Proceedings from The Pacific Asia Conference on Information Systems (June 2015), 154."},{"key":"e_1_3_2_1_12_1","volume-title":"John Wiley: New York.","author":"Herzberg F.","year":"1959","unstructured":"Herzberg , F. , Mausner , B. , and Snyderman , B . 1959 . The motivation to work (2 ed). John Wiley: New York. Herzberg,F., Mausner, B., and Snyderman, B. 1959. The motivation to work (2 ed). John Wiley: New York."},{"volume-title":"Work and the nature of man","author":"Herzberg F.","key":"e_1_3_2_1_13_1","unstructured":"Herzberg , F. 1966. Work and the nature of man . World Publishing : Cleveland, OH , US. Herzberg, F. 1966. Work and the nature of man. World Publishing: Cleveland, OH, US."},{"key":"e_1_3_2_1_14_1","first-page":"385","article-title":"Improving Construct Measurement in Management Research: Comments and a Quantitative Approach for Assessing the Theoretical Adequacy of Paper-and-Pencil and Survey-Type Instruments","author":"Schriesheim C. A.","year":"1993","unstructured":"Schriesheim , C. A. , Powers , K. J. , Scandura , T. A. , Gardiner , C. C. , & Lankau , M. J. 1993 . Improving Construct Measurement in Management Research: Comments and a Quantitative Approach for Assessing the Theoretical Adequacy of Paper-and-Pencil and Survey-Type Instruments . Journal of Management (19) , pp. 385 -- 417 . Schriesheim, C. A., Powers, K. J., Scandura, T. A., Gardiner, C. C., & Lankau, M. J. 1993. Improving Construct Measurement in Management Research: Comments and a Quantitative Approach for Assessing the Theoretical Adequacy of Paper-and-Pencil and Survey-Type Instruments. Journal of Management (19), pp. 385--417.","journal-title":"Journal of Management (19)"},{"key":"e_1_3_2_1_15_1","first-page":"175","volume-title":"An Analysis of Variance Approach to Content Validation. Organizational Research Methods (2)","author":"Hinkin T.","unstructured":"Hinkin , T. , & Tracey , J. 1999. An Analysis of Variance Approach to Content Validation. Organizational Research Methods (2) , pp. 175 -- 186 . Hinkin, T., & Tracey, J. 1999. An Analysis of Variance Approach to Content Validation. Organizational Research Methods (2), pp. 175--186."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0036374"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_2_1_18_1","volume-title":"Inc: Thousand Oaks, CA, US.","author":"Aiken L.S.","year":"1991","unstructured":"Aiken , L.S. , and West , S.G . 1991 . Multiple regression: Testing and interpreting interactions. Sage Publications , Inc: Thousand Oaks, CA, US. Aiken, L.S., and West, S.G. 1991. Multiple regression: Testing and interpreting interactions. Sage Publications, Inc: Thousand Oaks, CA, US."},{"volume-title":"Version 24.0.","author":"IBM Corp. 2016.","key":"e_1_3_2_1_19_1","unstructured":"IBM Corp. 2016. IBM SPSS Statistics for Windows , Version 24.0. Armonk, NY : IBM Corp . IBM Corp. 2016. IBM SPSS Statistics for Windows, Version 24.0. Armonk, NY: IBM Corp."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.4.661"},{"key":"e_1_3_2_1_21_1","unstructured":"Kark K. Shaikh A. and Brown C.. 2017. Technology budgets: From value preservation to value creation. Deloitte CIO Insider (November 2017).  Kark K. Shaikh A. and Brown C.. 2017. Technology budgets: From value preservation to value creation. Deloitte CIO Insider (November 2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"consumer business cyber security budget share","author":"Statista U.S.","year":"2017","unstructured":"Statista . U.S. consumer business cyber security budget share 2017 . Retrieved February 1, 2019, from https:\/\/www.statista.com\/statistics\/811116\/us-consumer-business-cyber-security-budget-percentage\/ Statista. U.S. consumer business cyber security budget share 2017. Retrieved February 1, 2019, from https:\/\/www.statista.com\/statistics\/811116\/us-consumer-business-cyber-security-budget-percentage\/"}],"event":{"name":"SIGMIS-CPR '19: 2019 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Nashville TN USA","acronym":"SIGMIS-CPR '19"},"container-title":["Proceedings of the 2019 on Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322385.3322419","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322385.3322419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:27Z","timestamp":1750206327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322385.3322419"}},"subtitle":["Employees who Pose Information Security Risk"],"short-title":[],"issued":{"date-parts":[[2019,6,12]]},"references-count":22,"alternative-id":["10.1145\/3322385.3322419","10.1145\/3322385"],"URL":"https:\/\/doi.org\/10.1145\/3322385.3322419","relation":{},"subject":[],"published":{"date-parts":[[2019,6,12]]},"assertion":[{"value":"2019-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}