{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:14:40Z","timestamp":1767453280193,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3487405.3487655","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T18:04:33Z","timestamp":1637604273000},"page":"14-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Operation Digital Ant"],"prefix":"10.1145","author":[{"given":"Manfred","family":"Hofmeier","sequence":"first","affiliation":[{"name":"Institute of Protection and Dependability, Universit\u00e4t der Bundeswehr M\u00fcnchen, Germany"}]},{"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[{"name":"Institute of Protection and Dependability, Universit\u00e4t der Bundeswehr M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NutriSafe - Sicherheit in der Lebensmittelproduktion und -logistik durch die Distributed-Ledger-Technologie https:\/\/nutrisafe.de last accessed 2021\/01\/22.  NutriSafe - Sicherheit in der Lebensmittelproduktion und -logistik durch die Distributed-Ledger-Technologie https:\/\/nutrisafe.de last accessed 2021\/01\/22."},{"key":"e_1_3_2_1_2_1","volume-title":"ENISA Threat Landscape 2020 - Insider Threat","author":"ENISA","year":"2020","unstructured":"ENISA : ENISA Threat Landscape 2020 - Insider Threat ( 2020 ). ENISA: ENISA Threat Landscape 2020 - Insider Threat (2020)."},{"key":"e_1_3_2_1_3_1","volume-title":"Sabotage, Fraud). Pearson Education","author":"Cappelli D.","year":"2012","unstructured":"Cappelli , D. , Moore , A. , Trzeciak , R. : he CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft , Sabotage, Fraud). Pearson Education ( 2012 ). Cappelli, D., Moore, A., Trzeciak, R.: he CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pearson Education (2012)."},{"key":"e_1_3_2_1_4_1","volume-title":"Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors","author":"Keeney M.","year":"2005","unstructured":"Keeney , M. : Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors . Carnegie Mellon University ( 2005 ). Keeney, M. : Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. Carnegie Mellon University (2005)."},{"key":"e_1_3_2_1_5_1","volume-title":"Monitoringbericht Innent\u00e4ter in Unternehmen 2 \u2013 Aktuelle inl\u00e4ndische Forschungsbeitr\u00e4ge, wesentliche Ergebnisse und Handlungsempfehlungen","author":"Bundeskriminalamt","year":"2020","unstructured":"Bundeskriminalamt : Monitoringbericht Innent\u00e4ter in Unternehmen 2 \u2013 Aktuelle inl\u00e4ndische Forschungsbeitr\u00e4ge, wesentliche Ergebnisse und Handlungsempfehlungen ( 2020 ). Bundeskriminalamt: Monitoringbericht Innent\u00e4ter in Unternehmen 2 \u2013 Aktuelle inl\u00e4ndische Forschungsbeitr\u00e4ge, wesentliche Ergebnisse und Handlungsempfehlungen (2020)."},{"key":"e_1_3_2_1_6_1","first-page":"106","volume-title":"Ferryman","author":"Greitzer F. L.","year":"2013","unstructured":"Greitzer , F. L. , Kangas , L. J. , Noonan , C. F. , Brown , C. R. , Ferryman , T. : Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis. In: e-Service Journal , 9(1), pp. 106 ( 2013 ). Greitzer, F. L., Kangas, L. J., Noonan, C. F., Brown, C. R., Ferryman, T.: Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis. In: e-Service Journal, 9(1), pp. 106 (2013)."},{"key":"e_1_3_2_1_7_1","volume-title":"Post","author":"Shaw E. D.","year":"1998","unstructured":"Shaw , E. D. , Ruby , K. , Post , J. : The Insider Threat to Information Systems : The Psychology of the Dangerous Insider . In : Security Awareness Bulletin ( 1998 ). Shaw, E. D., Ruby, K., Post, J.: The Insider Threat to Information Systems: The Psychology of the Dangerous Insider. In: Security Awareness Bulletin (1998)."},{"key":"e_1_3_2_1_8_1","volume-title":"Ochoa","author":"Homoliak I.","year":"2019","unstructured":"Homoliak , I. , Toffalini , F. , Guarnizo , J. , Elovici , Y. , Ochoa , M. : Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures . In : ACM Computing Surveys , 52(2) ( 2019 ). Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. In: ACM Computing Surveys, 52(2) (2019)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"87","volume":"19","author":"Hevner A. R.","year":"2007","unstructured":"Hevner , A. R. : A Three Cycle View of Design Science Research. In: Scandinavian Journal of Information Systems , 19 ( 2 ), 87 \u2013 92 ( 2007 ). Hevner, A. R.: A Three Cycle View of Design Science Research. In: Scandinavian Journal of Information Systems, 19(2), 87\u201392 (2007).","journal-title":"Information Systems"},{"key":"e_1_3_2_1_11_1","volume-title":"Chen","author":"Michael D.","year":"2006","unstructured":"Michael , D. , Chen , S. : Serious Games \u2013 Games That Educate, Train, and Inform. Thomson Course Technology PTR ( 2006 ). Michael, D., Chen, S.: Serious Games \u2013 Games That Educate, Train, and Inform. Thomson Course Technology PTR (2006)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427920"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139929"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21852-1_46"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63464-3_41"},{"key":"e_1_3_2_1_16_1","volume-title":"Serious Game Market, https:\/\/www.seriousgamemarket.com\/2012\/02\/ converting-cybersecurity-practice-into.html, last accessed 2021\/08\/10","author":"Alhadeff E.","year":"2012","unstructured":"Alhadeff , E. : Converting Cybersecurity Practice Into Engaging Serious Games , Serious Game Market, https:\/\/www.seriousgamemarket.com\/2012\/02\/ converting-cybersecurity-practice-into.html, last accessed 2021\/08\/10 ( 2012 ). Alhadeff, E.: Converting Cybersecurity Practice Into Engaging Serious Games, Serious Game Market, https:\/\/www.seriousgamemarket.com\/2012\/02\/ converting-cybersecurity-practice-into.html, last accessed 2021\/08\/10 (2012)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957792.2957800"},{"key":"e_1_3_2_1_18_1","volume-title":"Universit\u00e4t der Bundeswehr M\u00fcnchen","author":"Rieb A.","year":"2017","unstructured":"Rieb , A. : IT-Security Awareness mit \"Operation Digitales Cham\u00e4leon\". Dissertation , Universit\u00e4t der Bundeswehr M\u00fcnchen ( 2017 ). Rieb, A.: IT-Security Awareness mit \"Operation Digitales Cham\u00e4leon\". Dissertation, Universit\u00e4t der Bundeswehr M\u00fcnchen (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_2_1_20_1","volume-title":"NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit","author":"Wilhelmi T.","year":"2020","unstructured":"Wilhelmi , T. : Beschreibung und Modellierung der NutriSafe-Szenarien Produktion und Logistik von Bio-Kochschinken und Weichk\u00e4se . In: NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit ( 2020 ). Wilhelmi, T.: Beschreibung und Modellierung der NutriSafe-Szenarien Produktion und Logistik von Bio-Kochschinken und Weichk\u00e4se. In: NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit (2020)."},{"key":"e_1_3_2_1_21_1","volume-title":"NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit","author":"Hofmeier M.","year":"2020","unstructured":"Hofmeier , M. : Beispiele f\u00fcr IT-Infrastrukturen in den Wertsch\u00f6pfungsketten der NutriSafe-Szenarien . In: NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit ( 2020 ). Hofmeier, M.: Beispiele f\u00fcr IT-Infrastrukturen in den Wertsch\u00f6pfungsketten der NutriSafe-Szenarien. In: NutriSafe Toolkit, https:\/\/nutrisafe.de\/toolkit (2020)."},{"key":"e_1_3_2_1_22_1","first-page":"67","volume-title":"U.: Schwachstellen und Angriffsketten in der Wertsch\u00f6pfungskette der Fleischproduktion. In: SICHERHEIT","author":"Hofmeier M.","year":"2020","unstructured":"Hofmeier , M. , Lechner , U.: Schwachstellen und Angriffsketten in der Wertsch\u00f6pfungskette der Fleischproduktion. In: SICHERHEIT 2020 , pp. 67 - 77 . Gesellschaft f\u00fcr Informatik e.V., Bonn. Hofmeier, M., Lechner, U.: Schwachstellen und Angriffsketten in der Wertsch\u00f6pfungskette der Fleischproduktion. In: SICHERHEIT 2020, pp. 67-77. Gesellschaft f\u00fcr Informatik e.V., Bonn."},{"key":"e_1_3_2_1_23_1","unstructured":"Operation Digital Ant GitHub Repository https:\/\/github.com\/NutriSafe-DLT\/operation-digital-ant last accessed 2021\/01\/22.  Operation Digital Ant GitHub Repository https:\/\/github.com\/NutriSafe-DLT\/operation-digital-ant last accessed 2021\/01\/22."},{"key":"e_1_3_2_1_24_1","unstructured":"NutriSafe Toolkit https:\/\/nutrisafe.de\/toolkit last accessed 2021\/01\/22.  NutriSafe Toolkit https:\/\/nutrisafe.de\/toolkit last accessed 2021\/01\/22."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/2089195"},{"key":"e_1_3_2_1_26_1","first-page":"111","volume-title":"U.: A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime. In: GDPR & ePrivacy - APF 2017 - Proceedings of the 5th ENISA Annual Privacy Forum","author":"Rieb A.","year":"2017","unstructured":"Rieb , A. , Gurschler , T. , Lechner , U.: A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime. In: GDPR & ePrivacy - APF 2017 - Proceedings of the 5th ENISA Annual Privacy Forum , pp. 111 - 127 ( 2017 ). Rieb, A., Gurschler, T., Lechner, U.: A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime. In: GDPR & ePrivacy - APF 2017 - Proceedings of the 5th ENISA Annual Privacy Forum, pp. 111-127 (2017)."},{"key":"e_1_3_2_1_27_1","volume-title":"Sprechen \u00fcber das Kochen: eine rezeptionsanalytische Studie der Selbst-technologien im Rahmen der Gouvernementalit\u00e4t am Beispiel der Fernsehsendung \"Das perfekte Dinner","author":"Meyer D.","year":"2010","unstructured":"Meyer , D. : Sprechen \u00fcber das Kochen: eine rezeptionsanalytische Studie der Selbst-technologien im Rahmen der Gouvernementalit\u00e4t am Beispiel der Fernsehsendung \"Das perfekte Dinner \". LIT Verlag , M\u00fcnster ( 2010 ). Meyer, D.: Sprechen \u00fcber das Kochen: eine rezeptionsanalytische Studie der Selbst-technologien im Rahmen der Gouvernementalit\u00e4t am Beispiel der Fernsehsendung \"Das perfekte Dinner\". LIT Verlag, M\u00fcnster (2010)."},{"key":"e_1_3_2_1_28_1","volume-title":"International Workshop on Security (IWSEC), https:\/\/www.iwsec.org\/2020\/posters.html","author":"Hofmeier M.","year":"2020","unstructured":"Hofmeier , M. , Lechner , U. : Vulnerability in the Food Supply Chain - Approaches and Results from the NutriSafe Project . International Workshop on Security (IWSEC), https:\/\/www.iwsec.org\/2020\/posters.html ( 2020 ). Hofmeier, M., Lechner, U.: Vulnerability in the Food Supply Chain - Approaches and Results from the NutriSafe Project. International Workshop on Security (IWSEC), https:\/\/www.iwsec.org\/2020\/posters.html (2020)."}],"event":{"name":"EICC '21: European Interdisciplinary Cybersecurity Conference","acronym":"EICC '21","location":"Virtual Event Romania"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487405.3487655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:50Z","timestamp":1750188650000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487655"}},"subtitle":["A Serious Game Approach to Collect Insider Threat Scenarios and Raise Awareness"],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":28,"alternative-id":["10.1145\/3487405.3487655","10.1145\/3487405"],"URL":"https:\/\/doi.org\/10.1145\/3487405.3487655","relation":{},"subject":[],"published":{"date-parts":[[2021,11,10]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}