{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:51:48Z","timestamp":1725637908213},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/hicss.2009.104","type":"proceedings-article","created":{"date-parts":[[2011,3,18]],"date-time":"2011-03-18T13:31:33Z","timestamp":1300455093000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Case Studies of an Insider Framework"],"prefix":"10.1109","member":"263","reference":[{"journal-title":"A Model of Forensic Analysis Using Goal-Oriented Logging","year":"2007","author":"peisert","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254322"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/.2006.1629440"},{"journal-title":"Computer Capers","year":"1978","author":"whiteside","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2007.23"},{"journal-title":"San francisco da discloses city's network passwords","year":"0","author":"mcmillan","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.003"},{"key":"14","article-title":"larger prey are targets of phishing","author":"markoff","year":"2008","journal-title":"New York Times"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495972"},{"key":"21","article-title":"where can an insider attack?","author":"probst","year":"2006","journal-title":"Proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust"},{"year":"0","key":"3"},{"key":"20","first-page":"90","article-title":"a conceptual framework for monitoring insider misuse","author":"phyo","year":"2004","journal-title":"Proceedings of the Tenth Annual Scientific Conference on Web Technology New Media Communications and Telematics Theory Methods Tools and Applications"},{"year":"0","key":"2"},{"journal-title":"Report on Phishing","year":"2006","key":"1"},{"journal-title":"Poor Richard's Almanack","year":"1735","author":"franklin","key":"10"},{"key":"7","article-title":"fraud costs bank $7.1 billion.","author":"clark","year":"2008","journal-title":"New York Times"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.94"},{"key":"5","first-page":"1","author":"carlson","year":"2006","journal-title":"The Unifying Policy Hierarchy Model"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413158"},{"journal-title":"Lawyer says client was protecting city's code","year":"2008","author":"derbeken","key":"9"},{"journal-title":"Not guilty plea from cybercoup suspect","year":"2007","author":"derbeken","key":"8"}],"event":{"name":"2009 42nd Hawaii International Conference on System Sciences","start":{"date-parts":[[2009,1,5]]},"location":"Waikoloa, Hawaii, USA","end":{"date-parts":[[2009,1,8]]}},"container-title":["2009 42nd Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4755313\/4755314\/04755421.pdf?arnumber=4755421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:17:12Z","timestamp":1489763832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4755421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hicss.2009.104","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}