Three motivational subtypes can further be identified: individuals who are only concerned with their own outcomes (asocial intentional path), individuals who seek to harm an individual or group (antisocial intentional path), or individuals who wish to help an individual or group outside a target organization (prosocial intentional path). Factorial and Dimensional Approaches. Dissonance reduction strategies are adopted to reduce discrepancy, leading to attractor states inside or outside an organization. Too often these focus only on behavioreducating employees on proper cyber-proceduresand miss the attitudes-and-beliefs part of the equation. For example, an individual who holds a grudge against a former employer, or an opportunistic employee who sells secret information to a competitor. DArcy, J., & Lowry, P. B. Companies may have invested in technology to help minimize the impact of insider threats, but the lack of skilled employees may result in the benefits not being fully realized. Psychopathy in the workplace: The knowns and unknowns. The push to enable employees to work from home has complicated security management. Median employee tenure for men is 4.3 years, compared to 4 years for women. As studies of workplace incivility illustrate, understanding employee motivation is key to understanding CWB (Andersson & Pearson, 1999; Cortina et al., 2001). Following a critical review of these frameworks, we present a multi-level framework that considers individual, social, and organizational factors that create three pathways to InT determined by different kinds of motivation (e.g., Boss et al., 2015; Burns et al., 2019; DArcy & Lowry, 2019; Van Schaik et al., 2017; cf. China and Russia almost definitely have the Snowden docs. It happened, or you thought it happened? Get started with one of our 30-day trials. Unintentional Insiders: Most employees are just trying to do their jobs wellyet poor security habits too often put systems at risk. When an individual becomes aware of discrepancies between attitudes and behaviors (A1/B1, A2/B2), any perceived differences (B2 A1) produce a negative affective response (cognitive dissonance) due to an inconsistency in maintaining a coherent self-image. The fraud triangle revisited. A discrete, stable state that can be shifted to another state as a result of changes in internal or external factors. The dishonesty of honest people: A theory of self-concept maintenance. Finally, due to a combination of atypical personal and situational factors, the number of ambivalent insiders will also be relatively uncommon, but significantly greater than malicious behavior. Tate, J. (2012) found that while individuals high in Machiavellianism and psychopathy were more likely to demonstrate poor performance, together all three traits were strongly associated with CWBs, e.g., harassment and bullying, loafing, withdrawal, and sabotage. Kandias, M., Galbogini, K., Mitrou, L., & Gritzalis, D. (2013). For instance, from an organizational perspective, whistleblowers reflect an InT while from the insiders perspective, they are adhering to the norms of society. The case of Reality Winner (discussed later) illustrates this point. This leads to an ambivalence wherein an employee is both attracted to and repulsed by a working group or an organization. Moreover, individuals high in Machiavellianism and narcissism are more likely to use soft tactics (e.g., compliments) to manipulate those around them whereas individuals high in psychopathy are more likely to use hard tactics (e.g., aggression; Jonason et al., 2012). Schneier (2015) succinctly summarizes this issue in his analysis of the Snowden affair: while cryptography is strong, computer security is weak. Holtfreter, K. (2005). Officer suspected of compromising Chinese informants is arrested. Organizational cynicism: Extending the exit, voice, loyalty, and neglect model of employees responses to adverse conditions in the workplace. Like omitters, slippers do not likely have the intention to harm an organization and might self-report the spillage. Unintentional Insider Threat and Social Engineering - SEI Blog Consequently, the ambivalent path likely reflects the weakest attractor state of the three paths, with individuals being drawn back into highly cohesive groups or pushed or pulled into other groups. Careless employees, who lack training and basic cybersecurity awareness, intensified by the extensive acceptance of hybrid and work-from-home models, are involved in more than 50% of insider threat cases. Addressing the drivers of malicious behavior is an even more personal task. Boddy, C. R., Ladyshewsky, R. K., & Galvin, P. (2010). Here, the term whistleblower is based on the motivations of the employee rather than whether their actions meet the formal definition of whistleblower, i.e., using internal disclosure procedures appropriately. For instance, the actions of an unintentional InT might be observed and exploited by an external party through coercion or blackmail. Moreover, factors will also affect the extent to which they perceive threats and develop intentions to mitigate them (for a review, see Moody et al., 2018). However, in addition to these collective identities, individuals will also have individual and relational identities with associated values and obligations (e.g., Gaertner et al., 2012; Sedikides & Brewer, 2015). Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). For instance, theories of moral reasoning (e.g., Rest, 1992) suggest that individuals are motivated by the receipt of reward and avoidance of punishment, conformity to norms of an immediate group or society, or moral principles based on outcomes or intentions. Rather than considering only a single motivation pathway (e.g., Shaw et al., 1998; Shaw & Sellers, 2015; Shaw & Stock, 2011) or prioritizing threat perception (Moody et al., 2018), MAP-IT assumes that there are multiple motivational pathways that reflect the influence of individual differences and that these interact with a general motivation to maintain a positive self-image. Moreover, an individuals role and corresponding values and habits contribute to the intention to adopt appropriate security protocols (Tsai et al., 2016). Relationships of the dark triad of personality with objective and subjective career success. In most recent examples of malicious insider events, normal employees became malicious insiders gradually, with months or years of warning signs leading up to a culminating insider event. The risk of insider threats compared to outsider threats is an ongoing debate, though more . (2014). Hu, Q., Xu, Z., Dinev, T., & Ling, H. (2011). Furr, R. M., & Funder, D. C. (2018). Capturing these features, researchers have suggested that ethical sensemaking requires that 1) individuals want to see themselves as a good person, 2) when they are aware of the appropriate social norms and conventions, they attempt to adhere to them, but 3) they allow themselves to deviate from norms without experiencing cognitive dissonance (Mazar et al., 2008). Combining features of the dimensional and pathway approaches reviewed above, we developed the Multiple Approach Paths to Insider Threat (MAP-IT) framework that considers how differences in motivation, social processes, and organizational structure can directly or indirectly lead to InT behavior. For instance, a whistleblower[12] might believe that harming their organization benefits other groups (e.g., society, global community; Appelbaum et al., 2007). Someone who has some level of access to the internal workings of an organisation. In all these cases, InT behaviors will be high in terms of intensity and/or frequency, reflecting a deliberate and/or systematic effort to harm an organization or social institution. However, we cannot assume that the violation of trust evidenced in each of these cases necessarily reflects the same underlying motivation, personal characteristics, or social circumstances. Individual differences and information security awareness. Incivility in the workplace: Incidence and impact. Limiting who has access to sensitive systems and information is critical for managing insider threats. A pilot study of cyber security and privacy related behavior and personality traits. The intricacies of betrayal-of-trust behaviors make them difficult to label. Applying this perspective could have altered Winners pathway away from unauthorized disclosure of classified information, thereby potentially eliminating an InT. The function of cognitive dissonance in creating insider risk. Lim, S., Cortina, L. M., & Magley, V. J. The function of cognitive dissonance in creating insider risk. Sadism (a Dark Tetrad characteristic) is associated with desire to cause harm (Buckels et al., 2013; Chabrol et al., 2009; Reidy et al., 2011). Tinker, tailor, leaker, spy: The future costs of mass leaks. Job stress, incivility, and counterproductive work behavior (CWB): The moderating role of negative affectivity. These new approaches can yield more accurate results than traditional monitoring and can also help companies navigate the tricky business of safeguarding assets while also respecting employees rights. Rather than adopting an organization-centered approach that considers all employees potential InTs, using results from psychological studies, we have argued that multiple motivations can be identified and associated with specific kinds of InT behavior. Darley, J. M., & Batson, C. D. (1973). Shifts in an insiders path can occur as the result of persuasion or rationalization (see Figure 3). Effective frameworks for personnel security and counterintelligence require understanding the dynamic interaction between these sets of factors, including multiple motivations to harm an organization (antisocial), to help themselves (asocial), or to help others (prosocial). Johnson, J. J., & McIntye, C. L. (1998). Is AI Manufacturings Answer For Front-Line Skills Attrition? Much like a physical path, individuals can cross between these three paths as individual or situational factors change. Burkett, R. (2013). An insider threat could be a current or former employee, consultant, board member, or business partner and could be intentional, unintentional, or malicious. The rest is due to malicious insiders or disappointed trusted ones, who decide . These individuals ostensibly work within an existing organizational structure but, due to structural features (e.g., time constraints, lack of reporting mechanisms, apathetic/antagonistic management), believe that these mechanisms are inadequate in addressing a perceived issue. Most frameworks for understanding and mitigating InT reflect theoretical instruments that are based on adapting concepts from the behavioral and social sciences, case studies, and common sense. He subsequently disclosed classified information which, according to the New York Times, resulted in the killing or imprisonment of more than a dozen CIA assets and a catastrophic dismantlement of the U.S. intelligence network in China (Mazzetti et al., 2017). Best practices and necessary precautions in the defense industry may be seen as invasive at a bank or insurer. Security-forward identity and access management. Intelligence, as both an academic field of inquiry as well as a profession, must be informed by evidence and theories adopted from the behavioral and social sciences (National Academies of Science, Engineering, and Medicine, 2019). Using archival methods, a study of 209 InT cases that occurred between 1947 and 2015 in the U.S. found that divided loyalties have increased as a strong motive for InT, evident in 35% of cases since 1990 (Herbig, 2017). Whistleblowers can be defined as those individuals whose primary and principal motivation is to protect a larger group, i.e., the public, society (Dworkin & Baucus, 1998; Hersh, 2002). Contagion and differentiation in unethical behavior: The effect of one bad apple on the barrel. What Is an Insider Threat? Definition & Examples | Proofpoint US The Dark Triad at work: How toxic employees get their way. For instance, one survey found that 91% of employees indicated that they have not intentionally violated organizational policies when sharing information (Opinion Matters, 2019). For instance, there is a gender punishment gap leading to more females being fired for misconduct rather than males (Egan et al., 2022). The Dark Triad of personality: A 10 year review. Khan, N., J. Houghton, R., & Sharples, S. (2021). This pattern is in contrast to the criminal justice systems (Goulette et al., 2015). However, organizational and social factors have not always been systematically or comprehensively addressed within the InT literature as causal mechanisms (Greitzer, 2019; Maasberg et al., 2015; Min et al., 2019). Malicious Insiders: Types, Indicators & Common Techniques - Ekran System Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. When the software spots an anomaly, a small team investigates. A meta-analysis. For instance, IBM (2022) differentiates insiders in terms of motivational categories: the Pawn (an employee that is manipulated and used), the Goof (an employee who fails to comply with security policies), the Collaborator (an employee who coordinate with outsiders), and the Lone Wolf (an employee acting independently for their own self interest; see also Kaspersky, 2022). [17] Thus, an intentional path will differ depending on factors such as status, gender, and individual differences. Typically, the insider exhibits malicious behavior with intent, but sometimes, they are unaware of their actions are directed by an external threat actor. Given these conflicting accounts and perspectives, Snowden likely initially experienced ambivalence and was later attracted toward a more intentional pathway to InT behavior. Rempfer, K. (2019, November 5). Individuals might perceive that group members, or the group as a whole, have violated a norm or interpersonal commitment, resulting in the employee wishing to exit an organization and associate with another organization. Concurrently, perceptions of incivility (Andersson & Pearson, 1999; Cortina et al., 2001) are also associated with negative workplace outcomes such as loss of interpersonal and organizational cohesion, which could be exploited by external parties (e.g., Estes & Wang, 2008; Lim et al., 2008). A more nuanced understanding of motivation is required to effectively understand InT. They can also include a desire to help others outside a primary organization (i.e., prosocial motivation) or can be restricted to personal gain or loss avoidance (i.e., asocial motivation). [9] Individuals have a few dissonance reduction strategies (i.e., change behavior, change how they perceive a behavior, or change an attitude) to maintain a perception of consistency (Festinger, 1957; for a recent review, see Gawronski, 2012). (2022). (1997). By differentiating between these three motivational pathways, organizations can identify more systematic and effective means to address InT. (2015). The heuristic-systematic model of social information processing. In that they seek to adhere to existing social norms, they then seek out formal mechanisms outside the organizational structure. Our newly released eBook uncovers common misconceptions about insider threats, illustrates how these threats have manifested in real-world situations and provides new insight to help organizations reduce risk across four main categories: This infographic details recent industry findings and statistics on insider threats, and highlights how insiders across all four categories can use privileged access to cause intentional or unintentional damage. Shaw, E. D., Ruby, K. G., & Post, J. M. (1998). Recognizing different types of insiders. Bordia, P., Restubog, S. L. D., Jimmieson, N. L., & Irmer, B. E. (2011). The dark side of the insider: Detecting the insider threat through examination of dark triad personality traits. The resulting model is presented in Figure 4. Alternatively, if employees believe that they are not trusted by an organization, that organizations do not adequately address employees concerns internally, or that the organizational leadership does not reflect their values and is not held to the same standards (Schneider et al., 2013), psychological and organizational exit would likely increase leading to increases in InT behaviors. Development of a measure of workplace deviance. The drivers vary for each organization, and often for each microsegment. (2018). For instance, individuals develop national (e.g., U.S. citizen) and professional identities (e.g., programmer, soldier) and enter an organization with motivations to do well (e.g., Franke, 1999). Existing literature on insider threats generally assumes that individuals who commit cybersecurity transgressions do so due to an ulterior motive that is typically accompanied by malicious intent or the desire to enrich themselves for financial or personal gain. However, group members imperfectly adhere to group norms. Whistleblowing as civil disobedience: The case of Edward Snowden. (2018). Second, we assume that intentional malicious insider behavior represents an extreme deviation from the group norms, i.e., intentional, high-frequency transgressors, and/or high severity violations. Black Swan author Nicholas Nassim Taleb once wrote that intelligence consists in ignoring things that are irrelevant (avoiding false patterns). Organizations must take this definition to heart Theres always a balancing act when it comes to building and deploying cloud-native applications in environments like Amazon Web Services (AWS). CISO July 16, 2020 By Jeremy Goldstein 5 min read Series: Cybersecurity 101 What is an insider threat? Companies are certainly aware of the problem, but they rarely dedicate the resources or executive attention required to solve it. For instance, omitters were defined as individuals who engage in CWB because of failures of self-regulation, failing to consider the consequences of their actions in the absence of others. In a recent review, Homer (2019) provides support for the contributions of these three factors, with 27 of the 33 available studies providing evidence for all three factors. Best-in-class organizations rigorously measure both behaviors and attitudes and develop comprehensive change plans to beat cyber-negligence, complete with targets and clear owners within the organization. This helps them to move from reacting to insider-threat events to preventing them. Overview. Organizations tend to fall into two categories: those that have been breached and those that dont yet realize theyve been breached. The adaptive roles of positive and negative emotions in organizational insiders security-based precaution taking. Festinger, L. (1962). 3 min read - White hat hackers serve as a crucial line of cyber defense, working to identify and mitigate potential threats before malicious actors can exploit them. Edward Snowden: The whistleblower behind the NSA surveillance revelations. Expertise from Forbes Councils members, operated under license. For instance, A. P. Fiske (1991; A. P. Fiske & Rai, 2014) identified four relational models (idealized exchange norms) that translate into different moral motivations (Haidt & Graham, 2009). Mischel, W., & Shoda, Y. [16] Here, there might be a conflict between values of privacy and security and specific feature of surveillance activities, e.g., toward non-deviant group members rather than deviant out-group members. Arguably, the majority of InT detection methods are based on the assumption that intentional (malicious) behavior should be the primary focus of surveillance and security strategies. These results suggest that there are multiple motivational pathways that can create InTs. How Shoddy Machine Security Can Topple Empires, Assess Insider Threats by Asking 6 Key Questions, Australias Growing Focus on Critical Infrastructure Cybersecurity in 2023, Cloud Identity Security: It Doesnt Taste Like Chicken, ChatGPTs Role in the Evolution of Application Development, AI, ChatGPT and Identity Securitys Critical Human Element, Quantum Computing Is Coming Here are 4 Ways to Get Ready, How to Map Identity Security Maturity and Elevate Your Strategy, LTT Attack Targets Session Cookies to Push Crypto Scam, Protect Passwords, Dont Just Manage Them: A Game Plan for CIOs and CISOs. As a result, technology investments sometimes go unused or are underused. Identity security: its a battle being waged on three fronts and a rallying point for global cybersecurity professionals attending CyberArk IMPACT23, the identity security event of the year, Non-humans are everywhere these days. The lure of unethical actions that benefit others. Serial bad actors may not be caught; malicious activity may be built into the baseline of normal activity. While most cyber organizations know that negligence is an issue, many start and end their prevention efforts with half-hearted employee education and anti-phishing campaigns. With threats coming from every direction emails on company computers, text and voice Keep up to date on security best practices, events and webinars. Fostering integrity in research: Definitions, current knowledge, and future directions. Greitzer, F. L., & Purl, J. For instance, despite valuing their role in an organization, an individual might share information with another due to financial hardship, rationalizing a need to support their family thereby devaluing the organization. Tessian Cloud Email Security intelligently prevents advanced email threats and protects against data loss, to strengthen email security and build smarter security cultures in modern enterprises. (2009). Failure to help when in a hurry: Callousness or conflict? Motivational pathways reflect employees who are otherwise committed to the group but fail to adhere to established and promulgated security policies (unintentional path), those that have mixed motivations toward their group or divided loyalties between groups (ambivalent path), and individuals who intentionally harm an organization (intentional path). Keefe, P. R. (2022, June 6). Buckels, E. E., Jones, D. N., & Paulhus, D. L. (2013). Thus, in groups defined by individuals with heterogeneous sets of norms, interpersonal conflicts are more likely. Grey literature refers to non-academic sources such as research conducted by private organizations wherein datasets are not always transparent, and their methodologies are not always clearly described. [3] Crucially, workplace incivility (Andersson & Pearson, 1999)[4] is associated with counterproductive workplace behaviors (CWBs) in that it can reduce productivity and increase stress, leading to organizational exit (Penney & Spector, 2005; Sakurai & Jex, 2012). They then design changes in process, governance, hiring, compensation, and so on, specific to the identified risk areas aligned to their microsegmentation strategy. We recently reviewed the VERIS Community Database, which contains about 7,800 publicly reported breaches from 2012 to 2017, to identify the prevalence of insider threat as a core element of cyberattacks. The 2020 Cost of Insider Threat [PDF] Report by the Ponemon Institute states that it takes on average 77 days to detect and contain an insider-related security incident. (2019). (2016). Gregg, A. P., Sedikides, C., & Gebauer, J. E. (2011). Metsavas was accused of rape and threatened with 15 years in Russian prison. Thus, before and after a critical incident, insider threat programs should assess the perceptions of organizational culture, perception of social issues, and incivility held by employees. Identifying Common Characteristics of Malicious Insiders For a more comprehensive list of factors associated with workplace deviance, see Elias (2013). A motivational hierarchy within: Primacy of the individual self, relational self, or collective self? InTs can also be understood in terms of risk perception: an individual might be generally motivated to avoid InTs behaviors but might not perceive a risk at a given moment (e.g., Boss et al., 2015; Burns et al., 2019; DArcy & Lowry, 2019; Van Schaik et al., 2017, 2018). In his contact with an undercover FBI agent posing as an agent of the PRC, Orr stated that he was the foremost expert on attacking the computer network and that he could destroy U.S. military satellites for a financial reward. Responding to threats only after they have occurred can be very costly and disruptive. Most prevention programs fall short either by focusing exclusively on monitoring behavior or by failing to consider cultural and privacy norms. Examining the perception of workplace incivility based on personality characteristics. Shear, M. D., & Schmidt, M. S. (2013). In 2017, National Security Agency contractor Reality Winner pleaded guilty to leaking a classified NSA report about Russian interference in the 2016 U.S. elections (Volz, 2018). In addition to the Dark Triad, sadism has also been widely studied. Specifically, workplace or interpersonal incivility will reduce group cohesion making individuals in these settings more susceptible to influence from external parties. Based on this review, dimensional approaches appear to represent an improvement over taxonomies. The hero who betrayed his country. As we explore below, prominent Insider Threat (InT) cases in the U.S., such as that of Chelsea Manning and Edward Snowden, raise issues concerning the influence of personality traits and values, social and cognitive processes, and organizational structure and climate (Cole, 2015; Fidler & Ganguly, 2015; Hu et al., 2011; Scheuerman, 2014; Verble, 2014). Intentional Case Studies. For instance, in 2007, Deniss Metsavas, an Estonian army officer, was coerced into spying for Russia after he was confronted with video footage of his sexual relations the night before (Weiss, 2019). First, we assume that InTs vary in terms of their intentionality based on a heterogenous set of individual differences. Arguably, the MAP-IT approach to InT prevention and detection is viable in all organizations that seek to address InT, be it within the intelligence community or the public sector. McGrath, A. Tit for tat? For instance, studies have found that high conscientiousness and agreeableness are associated with greater adherence to cybersecurity practices (McCormac et al., 2017). 5 Altmetric Metrics Abstract Cyber security is vital to the success of today's digital economy. Bradley Manning transitioned into Chelsea Manning. (1978). Correlating human traits and cyber security behavior intentions. Insider threats (InT) are a growing concern for private and public institutions, resulting in a shift of emphasis from perimeter-based defences to internal detection mechanisms. Funder, D. C., & Colvin, C. R. (1991). These observations can also be directly aligned with evidence from studies of InT. Building an ontology of cyber security. Spurk, D., Keller, A. C., & Hirschi, A. Hershcovis, M. S. (2011). The whole point of moving production to the cloud Phishing is a big problem thats getting even bigger as cybercriminals find new ways to hook employees. Evans, J. S. B., & Frankish, K. E. Verble, J. In this case, organizations must be mindful of change management to reduce the likelihood of InT. (Cole, 2015; Fidler & Ganguly, 2015; Hu et al., 2011; Scheuerman, 2014; Verble, 2014), (National Insider Threat Task Force, 2022), (Cappelli et al., 2012; Greitzer, 2019; Greitzer et al., 2019; Shaw et al., 1999), Shaw et al., 1998; Shaw & Sellers, 2015; Shaw & Stock, 2011, (Greitzer & Purl, 2022; Moody et al., 2018), Funder & Colvin, 1991; Furr & Funder, 2018; Mischel & Shoda, 1995, Cappelli et al., 2012; INSA, 2019; Wilder, 2017, (Costa et al., 2016; Greitzer et al., 2019; Greitzer & Purl, 2022; Oltramari et al., 2015), (Penney & Spector, 2005; Sakurai & Jex, 2012), Choma et al., 2012; Lipkus & Siegler, 1993, (Evans & Frankish, 2009; Kahneman & Klein, 2009; Stanovich, 2010; Todd & Gigerenzer, 2012), (Cappelli et al., 2012; Keeney et al., 2005), Gaertner et al., 2012; Sedikides & Brewer, 2015, (National Academies of Science, Engineering, and Medicine, 2019), Petty & Briol, 2011; Todorov et al., 2002, (Gaertner et al., 2012; Sedikides & Brewer, 2015), (Bennett & Robinson, 2000; Giacalone & Greenberg, 1997; Robinson & Bennet, 1995), (Greitzer, 2019; Maasberg et al., 2015; Min et al., 2019), (Hu et al., 2011; Schneider et al., 2013), (Johnson & McIntye, 1998; Kalemci et al., 2019), (Ambrose et al., 2002; Hanley et al., 2009), (Andersson & Pearson, 1999; Cortina et al., 2001), (Batson et al., 1978; Darley & Batson, 1973), (Choma et al., 2012; Lipkus & Siegler, 1993; Sliter et al., 2015), (Furnham et al., 2013; Jones & Figueredo, 2013; Paulhus, 2014), (Kandias et al., 2013; Maasberg et al., 2015; Schoenherr & Thomson, 2020), (Greitzer et al., 2013; Nurse et al., 2014), (Buckels et al., 2013; Chabrol et al., 2009; Reidy et al., 2011), (Greitzer, Strozer, Cohen, Bergey, et al., 2014; Greitzer, Strozer, Cohen, Moore, et al., 2014; Khan et al., 2021), Costa et al., 2014, 2016; Greitzer et al., 2019; Greitzer & Purl, 2022; Obrst et al., 2012; Oltramari et al., 2014, 2015; Raskin et al., 2010, Boss et al., 2015; Burns et al., 2019; DArcy & Lowry, 2019; Van Schaik et al., 2017, (Funder & Colvin, 1991; Furr & Funder, 2018; Mischel & Shoda, 1995), (Gino et al., 2009, 2013; Mazar et al., 2008), (Bennett & Robinson, 2000; Robinson & Bennet, 1995), (Shaw et al., 1998; Shaw & Sellers, 2015), (Andersson & Pearson, 1999; Cortina et al., 2001; Sliter et al., 2015), Boss et al., 2015; Burns et al., 2019; DArcy & Lowry, 2019; Van Schaik et al., 2017, 2018, McCormac et al., 2017; Schoenherr, 2022a; Schoenherr & Thomson, 2020, (Cho et al., 2016; Greitzer et al., 2019; Halevi et al., 2013), (A. P. Fiske, 1991; A. P. Fiske & Rai, 2014), Greitzer et al., 2021; Halevi et al., 2013, (House Permanent Select Committee on Intelligence, 2016), (Benson & Moore, 1992; Holtfreter, 2005; Weisburd et al., 1991), Department of Justice, United States, 2019, (Greitzer, 2019; Schoenherr & Thomson, 2020), Posey, Bennett, & Roberts, 2011; Posey, Bennett, Roberts, et al., 2011, https://www.tbs-sct.canada.ca/pses-saff/2020/results-resultats/en/bq-pq/org/83#s7, https://fas.org/irp/agency/dod/dsb/predicting.pdf, https://doi.org/10.1016/s0749-5978(02)00037-7, https://doi.org/10.1108/14720700710827176, https://doi.org/10.1177/014616727800400120, https://www.latimes.com/nation/la-xpm-2013-jun-21-la-na-nsa-snowden-20130622-story.html, https://doi.org/10.1037/0021-9010.85.3.349, https://doi.org/10.1177/0022427892029003001, https://www.washingtonpost.com/news/post-nation/wp/2017/06/06/what-we-know-about-reality-winner-the-contractor-accused-of-leaking-an-nsa-document/, https://doi.org/10.1080/13594320903338884, https://doi.org/10.1007/s10551-010-0492-3, https://doi.org/10.25300/misq/2015/39.4.5, https://doi.org/10.1016/j.paid.2009.06.020, https://doi.org/10.1080/00224545.2012.667459, https://doi.org/10.1016/s0065-2601(08)60330-5, https://www.code42.com/resources/reports/2021-data-exposure, https://www.cisa.gov/defining-insider-threats, https://www.justice.gov/opa/pr/former-cia-officer-sentenced-conspiracy-commit-espionage, https://doi.org/10.18574/nyu/9780814722602.001.0001, https://doi.org/10.1093/acprof:oso/9780199230167.001.0001, https://www.fbi.gov/contact-us/field-offices/losangeles/news/press-releases/former-air-force-employee-sentenced-to-prison-for-retaining-stolen-government-property-to-sell-to-a-foreign-government, https://doi.org/10.1038/scientificamerican1062-93, https://doi.org/10.1037/0022-3514.60.5.773, https://doi.org/10.1016/j.jesp.2012.03.009, https://doi.org/10.1521/soco.2012.30.6.652, https://doi.org/10.1111/j.1467-9280.2009.02306.x, https://doi.org/10.1016/j.jebo.2013.04.005, https://doi.org/10.1080/09557571.2020.1853053, https://www.nytimes.com/2018/01/16/us/politics/cia-china-mole-arrest-jerry-chun-shing-lee.html?action=click&module=RelatedCoverage&pgtype=Articleion=Footer, https://doi.org/10.1016/j.jcrimjus.2015.07.003, https://doi.org/10.1016/j.cose.2017.11.015, https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance, https://doi.org/10.1007/978-1-4419-7988-9_14, https://doi.org/10.2979/eservicej.9.1.106, https://doi.org/10.1016/j.procs.2019.05.090, https://doi.org/10.1007/s42979-021-00990-1, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6758854&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6758854, https://doi.org/10.1080/01973533.2004.9646399, https://doi.org/10.1007/s11211-007-0034-z, https://doi.org/10.1093/acprof:oso/9780195320916.003.015, https://doi.org/10.1177/01461672002612004, https://doi.org/10.1016/s1367-5788(02)00025-1, https://doi.org/10.1037/0022-3514.66.2.276, https://doi.org/10.1016/j.jcrimjus.2005.04.005, https://nymag.com/intelligencer/2017/12/who-is-reality-winner.html, https://www.ibm.com/topics/insider-threats, https://www.insaonline.org/wp-content/uploads/2019/10/INSA_WP_Categories_of_Insider_Threats-1.pdf, https://doi.org/10.2466/pr0.1998.82.3.843, https://doi.org/10.1016/j.paid.2011.11.008, https://doi.org/10.1108/ejmbe-11-2018-0125, https://doi.org/10.1007/978-3-642-38631-2_17, https://encyclopedia.kaspersky.com/knowledge/recognizing-different-types-of-insiders/, https://www.newyorker.com/magazine/2022/06/13/the-surreal-case-of-a-cia-hackers-revenge, https://doi.org/10.1007/s10111-021-00690-z, https://doi.org/10.1016/j.jpsychires.2008.01.001, https://doi.org/10.1037/0021-9010.93.1.95, https://doi.org/10.1080/00223980.1993.9915583, https://doi.org/10.1007/s11948-999-0014-9, https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html?_r=0, https://doi.org/10.1016/j.chb.2016.11.065, https://doi.org/10.1016/j.jrp.2019.103862, https://doi.org/10.1037/0033-295x.102.2.246, https://www.nap.edu/catalog/25335/a-decadal-survey-of-the-social-and-behavioral-sciences-a, https://www.dni.gov/files/NCSC/documents/products/National_Insider_Threat_Task_Force_Fact_Sheet.pdf, https://pages.egress.com/rs/344-XTD-684/images/egress-opinionmatters-insider-threat-research-report-a4-uk-digital.pdf, https://www.nbcnews.com/news/us-news/who-reality-winner-nsa-contractor-accused-top-secret-leak-n768661, https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf, https://doi.org/10.1016/j.cose.2011.05.002, https://doi.org/10.1080/07421222.2015.1138374, https://doi.org/10.1111/j.1467-6494.2010.00691.x, https://www.armytimes.com/news/your-army/2019/11/05/the-mass-shooting-at-fort-hood-was-10-years-ago-on-nov-5-2009/, https://doi.org/10.1146/annurev-psych-113011-143809, https://www.wired.com/2015/06/course-china-russia-snowden-documents/, https://doi.org/10.1109/cybersecurity49315.2020.9138862, https://doi.org/10.1109/cybersa52016.2021.9478213, https://www.nytimes.com/2013/09/17/us/shooting-reported-at-washington-navy-yard.html, https://doi.org/10.1016/j.avb.2012.11.007, https://doi.org/10.1007/s11948-006-0006-y, https://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html, https://f.hubspotusercontent20.net/hubfs/1670277/%5BTessian%20Research%5D%20The%20State%20of%20Data%20Loss%20Prevention%20(DLP)%202020.pdf, https://doi.org/10.4135/9781412976046.n11, https://doi.org/10.1016/j.cose.2016.02.009.
Associated Sr10 Setup, Cheap Hotels In North Carolina, Articles A