This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Insiders Behaving Badly
July/August 2008 (vol. 6 no. 4)
pp. 66-70
Joel Predd, RAND
Jeffrey Hunker, Carnegie Mellon University
Carla Bulford, Jeffrey Hunker Associates
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.

1. S.L. Robinson and J. Greenberg, "Employees Behaving Badly: Dimensions, Determinants, and Dilemmas in the Study of Workplace Deviance," Trends in Organizational Behavior, vol. 5, C.L. Cooper and D.M. Rousseau, eds., John Wiley and Sons, 1998, pp. 1–30.
2. D. Harper, "Spotlight Abuse, Save Profits," Industrial Distribution, vol 79, no. 10, 1990, pp. 47–51.

Index Terms:
insider threat, cyber security, cyber crime, secure systems
Citation:
Joel Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford, "Insiders Behaving Badly," IEEE Security & Privacy, vol. 6, no. 4, pp. 66-70, July-Aug. 2008, doi:10.1109/MSP.2008.87
Usage of this product signifies your acceptance of the Terms of Use.