|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn967938743 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
170109s2016 nyu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d IDEBK
|d EBLCP
|d YDX
|d CSAIL
|d IVG
|d OCLCQ
|d AGLDB
|d ICA
|d VLB
|d OCLCQ
|d JSTOR
|d OCLCO
|d UPM
|d OCLCA
|d DEBBG
|d DEGRU
|d OCLCA
|d MERUC
|d D6H
|d VTS
|d CEF
|d INT
|d OCLCQ
|d STF
|d OCLCQ
|d AUW
|d BTN
|d INTCL
|d MHW
|d SNK
|d UKAHL
|d OCLCQ
|d OCLCA
|d AJS
|d S2H
|d OCLCO
|d OCLCQ
|d YWS
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 979968916
|a 988944852
|a 992836897
|
020 |
|
|
|a 9781501705946
|q (electronic bk.)
|
020 |
|
|
|a 1501705946
|q (electronic bk.)
|
020 |
|
|
|z 9781501705168
|
020 |
|
|
|z 1501705164
|
020 |
|
|
|z 9781501705175
|
020 |
|
|
|z 1501705172
|
024 |
7 |
|
|a 10.7591/9781501705946
|2 doi
|
029 |
1 |
|
|a AU@
|b 000059644054
|
029 |
1 |
|
|a DEBSZ
|b 489860109
|
029 |
1 |
|
|a GBVCP
|b 882893513
|
035 |
|
|
|a (OCoLC)967938743
|z (OCoLC)979968916
|z (OCoLC)988944852
|z (OCoLC)992836897
|
037 |
|
|
|a 22573/ctt1tk96zt
|b JSTOR
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV6432
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
072 |
|
7 |
|a POL012000
|2 bisacsh
|
072 |
|
7 |
|a POL066000
|2 bisacsh
|
072 |
|
7 |
|a POL043000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/73
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Insider threats /
|c edited by Matthew Bunn and Scott D. Sagan.
|
264 |
|
1 |
|a Ithaca ;
|a London :
|b Cornell University Press,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a Cornell studies in security affairs
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction: inside the insider threat / Matthew Bunn and Scott D. Sagan -- Insiders and outsiders: a survey of terrorist threats to nuclear facilities / Thomas Hegghammer and Andreas Hoelstad Dæhli -- The Fort Hood terrorist attack: an organizational postmortem of Army and FBI deficiencies / Amy Zegart -- Lessons from the anthrax letters / Jessica Stern and Ronald Schouten -- Green-on-blue violence: a first look at lessons from the insider threat in Afghanistan / Austin Long -- Preventing insider theft: lessons from the casino and pharmaceutical industries / Matthew Bunn and Kathryn M. Glynn -- A worst practices guide to insider threats / Matthew Bunn and Scott D. Sagan.
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed January 9, 2017).
|
520 |
|
|
|a "High-security organizations around the world face devastating threats from insiders--trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. [This book] offers ... case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. [The editors] outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize 'worst practices' from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose. Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. [This book offers] case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities."--
|c Provided by publisher
|
546 |
|
|
|a In English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Terrorism
|z United States
|x Prevention.
|
650 |
|
0 |
|a Nuclear terrorism
|x Prevention.
|
650 |
|
6 |
|a Terrorisme
|z États-Unis
|x Prévention.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Security (National & International)
|2 bisacsh
|
650 |
|
7 |
|a Nuclear terrorism
|x Prevention
|2 fast
|
650 |
|
7 |
|a Terrorism
|x Prevention
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
650 |
|
7 |
|a Bedrohung
|2 gnd
|
650 |
|
7 |
|a Prävention
|2 gnd
|
650 |
|
7 |
|a Terrorismus
|2 gnd
|
700 |
1 |
|
|a Bunn, Matthew,
|e editor.
|
700 |
1 |
|
|a Sagan, Scott Douglas,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Insider threats.
|d Ithaca : Cornell University Press, 2016
|z 9781501705168
|w (DLC) 2016020235
|w (OCoLC)948427429
|
830 |
|
0 |
|a Cornell studies in security affairs.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.7591/j.ctt1tm7g7b
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32994530
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32752878
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9781501705946
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4778622
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1449052
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis37329726
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13108467
|
994 |
|
|
|a 92
|b IZTAP
|