|
Andersen, D. F., Cappelli, D., Gonzalez, J. J., Mojtahedzadeh, M., Moore, A. P., Rich, E., Sarriegui, J. M., Shimeall, T. J., Stanton, J. M., Weaver, E., and Zagonel, A. (2004). Preliminary system dynamics maps of the insider cyber-threat problem. In Proceedings of the 22nd International Conference of the System Dynamics Society. Band, S. R., Cappelli, D. M., Fisher, L. F., Moore, A. P., Shaw, E. D., and Trzeciak, R. F. (2006). Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis. Carnegie Mellon University Software Engineering Institute. Bosma, H., Peter, R., Siegrist, J., Marmot, M. (1998). Two alternative job stress models and the risk of coronary heart disease. Am J Public Health 88:68–74 Carnegie Mellon University's Computer Emergency Response Team (CERT) http://www.cert.org/ Casey, E. (2004). Digital Evidence and Computer Crime, p159-164 Second Edition, ACADEMIC PRESS Chang, C.P. and Chang, F.J (2010), Relationships among traditional Chinese personality traits, work stress, and emotional intelligence in workers in the semiconductor industry in Taiwan. Qual Qunat 44: 733-748 Cheng, Y., Guo, Y.L., and Yeh, W.Y. (2001), A national survey of psychosocial job stresses and their implications for health among working people in Taiwan. International Archives of Occupational and Environment Health 74: 495-504 Cohen, S., & Bailey, D. E. (1997). What makes teams work: Group effectiveness research from the shop floor to the executive suite. Journal of Management, 23, 239-290. Central Statistics Office (CSO) (2010). 2010 E-Crime Watch Survey- Survey Results. CSO magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University, and Deloitte. Retrieved May 25, 2010, from http://www.cert.org/archive/pdf/ecrimesummary10.pdf Geritzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., and Hull, T.D. (2008). Combating the Insider Cyber Threat. IEEE Security and Privacy, 6(1), 61-64 Herzberg, F., Maunser, B. and Snyderman, B. (1959). The Motivation to Work, John Wiley and Sons Inc., New York Hirsch, D. (1987). The Truck Bomb and Insider Treats to Nuclear Facilities. in Paul Leventhal and Yonah Alexander, eds., Preventing Nuclear Terrorism: Report and Papers of the International Task Force On Prevention of Nuclear Terrorism (Lanham, MD: Rowan & Littlefield) Hogg, M. (1992). The social psychology of group cohesiveness: From attraction to socialidentity. New York: John Wiley Honnellio, A.L. and Rydell, S. (2007). Sabotage vulnerability of nuclear power plants. Int. J. Nuclear Governance, Economy and Ecology, Vol. 1, No. 3, pp.312–321. Krantz, G., Berntsson, L., and Lundberg, U. (2005). Total workload, work stress and perceived symptoms in Swedish male and female white-collar employees. European Journal of Public Health, Vol. 15, No. 2, 209–214 Lee, H.Y., Yeh, W.Y., Chen, C.W., and Wang, J.D. (2005). Prevalence and Psychosocial Risk Factors of Upper Extremity Musculosketletal Pain in Industries of Taiwan: A Nationwide Study. Journal of occupational Health, 47: 311-318 Melara, C., Sarriegui, J.M., Gonzalez, J.J., Sawicka, A. and Cooke, D.L. (2003). A System Dynamics Model of an Insider Attack on an Information System. In Proceedings of the 21st International Conference of the System Dynamics Society. Maslow, A.H. (1954). Motivation and Personality. Harper & Row Publishers, New York, NY Moore, A. P., Cappelli, D. M., and Trzeciak, R. F. (2008). The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. Insider Attack and Cyber Security, vol. 39, 17-52 Nunnally, J. C. & Berstein, I.H. (1994). Psychometric theory (3rd ed.), New York: McGraw-Hill. Parsons, E. & Broadbridge, A. (2006). Job motivation and satisfaction: Unpacking the key factors for charity shop managers. Journal of Retailing and Consumer Services 13: 121-131 Probst, C.W., Hansen, R.R., and Nielson, F. (2007). Where can an Insider Attack ?, in Formal Aspects in Security and Trust. Springer Berlin / Heidelberg. p. 127-142. Randazzo, M. R., Keeney, M. M., Kowalski, E. F., Cappelli, D. M., and Moore, A. P. (2004). Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. U.S. Secret Service and CERT Coordination Center /Software Engineering Institute: 25 Sakai, Y., Akiyama, T., Miyake, Y., Kawamura, Y., Tsuda, H., Kurabbayashi, L., Tominaga, M., Noda, T., Akiskal, K., Akiskal, H. (2005). Temperament and job stress in Japanese company employees. Journal of Affective Disorders 85: 101-112 Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24, 124-133 Stranks, J. (2005). Stress at Work: Management and Prevention. 1st, p21, ELSEVIER Terwee, C. B., Bot, S. D.M., Boer, M. R., Windt, D. A.W.M., knol, D. L., Dekker, J., Bouter, L. M., Vet, H. C.W. (2007) Quality criteria were proposed for measurement properties of health status questionnaires. Journal of Clinical Epidemiology, 60: 34-42. Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E. (2005). The Insider Threat to Information Systems and the Effectiveness of ISO17799. Computers and Security, 24(6), 472-484. Tietjen, M.A. and Myers, R.M. (1998). Motivation and job satisfaction. Management Decision 36/4, 226-231 Tuglular, T. (2000). A Preliminary Structural Approach to Insider Computer Misuse Incidents. EICAR 2000 Best Paper Proceedings (pp. 105-125). Aalborg, Denmark: EICAR. Wu, W. T., Lin, H. T., Wang, J. D., & Kuo, C. C. (1999). Chinese basic personality inventory. Taipei, Psychological Publishing Co.
|