Insider Threats /
High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ithaca, NY :
Cornell University Press,
[2017]
|
Colección: | Cornell Studies in Security Affairs
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | DEGRUYTERUP_9781501705946 | ||
003 | DE-B1597 | ||
005 | 20220302035458.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 220302t20172017nyu fo d z eng d | ||
019 | |a (OCoLC)979968916 | ||
020 | |a 9781501705946 | ||
024 | 7 | |a 10.7591/9781501705946 |2 doi | |
035 | |a (DE-B1597)481728 | ||
035 | |a (OCoLC)967938743 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a nyu |c US-NY | ||
050 | 4 | |a HV6432 | |
072 | 7 | |a POL012000 |2 bisacsh | |
082 | 0 | 4 | |a 658.4/73 |
245 | 0 | 0 | |a Insider Threats / |c ed. by Matthew Bunn, Scott D. Sagan. |
264 | 1 | |a Ithaca, NY : |b Cornell University Press, |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 online resource (216 p.) : |b 1 halftone, 3 tables, 6 charts | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 0 | |a Cornell Studies in Security Affairs | |
505 | 0 | 0 | |t Frontmatter -- |t Contents -- |t Contributors -- |t Acknowledgments -- |t Introduction: Inside the Insider Threat -- |t 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- |t 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- |t 3. Lessons from the Anthrax Letters -- |t 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- |t 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- |t 6. A Worst Practices Guide to Insider Threats -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022) | |
650 | 0 | |a Nuclear terrorism |x Prevention |x United States. | |
650 | 0 | |a Nuclear terrorism |x Prevention. | |
650 | 0 | |a Terrorism |x Prevention |x United States. | |
650 | 0 | |a Terrorism |z United States |x Prevention. | |
650 | 0 | |a Terrorism--Prevention--United States. | |
650 | 4 | |a International Studies. | |
650 | 4 | |a Political Science & Political History. | |
650 | 7 | |a POLITICAL SCIENCE / Security (National & International). |2 bisacsh | |
700 | 1 | |a Bunn, Matthew, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Bunn, Matthew, |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Dæhli, Andreas Hoelstad, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Glynn, Kathryn M., |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Hegghammer, Thomas, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Long, Austin, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Sagan, Scott D., |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Sagan, Scott D., |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Schouten, Ronald, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Stern, Jessica, |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
700 | 1 | |a Zegart, Amy B., |e contributor. |4 ctb |4 https://id.loc.gov/vocabulary/relators/ctb | |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t Cornell University Press Complete eBook-Package 2017 |z 9783110665871 |
856 | 4 | 0 | |u https://doi.uam.elogim.com/10.7591/9781501705946 |z Texto completo |
856 | 4 | 0 | |u https://degruyter.uam.elogim.com/isbn/9781501705946 |z Texto completo |
912 | |a 978-3-11-066587-1 Cornell University Press Complete eBook-Package 2017 |b 2017 | ||
912 | |a EBA_BACKALL | ||
912 | |a EBA_CL_SN | ||
912 | |a EBA_EBACKALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_SN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESSHALL | ||
912 | |a EBA_PPALL | ||
912 | |a EBA_SSHALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA11SSHE | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA17SSHEE | ||
912 | |a PDA5EBK |