000 05572nam a22008175i 4500
001 9781501705946
003 DE-B1597
005 20211101153815.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 190708s2017 nyu fo d z eng d
020 _a9781501705946
024 7 _a10.7591/9781501705946
_2doi
035 _a(DE-B1597)481728
035 _a(OCoLC)967938743
035 _a(OCoLC)979968916
040 _aDE-B1597
_beng
_cDE-B1597
_erda
041 0 _aeng
044 _anyu
_cUS-NY
050 4 _aHV6432
072 7 _aPOL012000
_2bisacsh
245 0 0 _aInsider Threats /
_cMatthew Bunn, Scott D. Sagan.
264 1 _aIthaca, NY :
_bCornell University Press,
_c[2017]
264 4 _c©2017
300 _a1 online resource :
_b1 halftone, 3 tables, 6 charts
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aCornell Studies in Security Affairs
505 0 0 _tFrontmatter --
_tContents --
_tContributors --
_tAcknowledgments --
_tIntroduction: Inside the Insider Threat --
_t1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities /
_rHegghammer, Thomas / Dæhli, Andreas Hoelstad --
_t2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies /
_rZegart, Amy B. --
_t3. Lessons from the Anthrax Letters /
_rStern, Jessica / Schouten, Ronald --
_t4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan /
_rLong, Austin --
_t5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries /
_rBunn, Matthew / Glynn, Kathryn M. --
_t6. A Worst Practices Guide to Insider Threats /
_rBunn, Matthew / Sagan, Scott D. --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aHigh-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 08. Jul 2019)
650 0 _aNuclear terrorism
_xPrevention.
650 0 _aTerrorism
_zUnited States
_xPrevention.
650 4 _aInternational Studies.
650 7 _0(DE-601)104331046
_0(DE-588)4144266-0
_aBedrohung
_2gnd
650 7 _0(DE-601)104364106
_0(DE-588)4076308-0
_aPrävention
_2gnd
650 7 _0(DE-601)106143212
_0(DE-588)4059534-1
_aTerrorismus
_2gnd
650 7 _aPOLITICAL SCIENCE / Security (National & International).
_2bisacsh
700 1 _aBunn, Matthew,
_eeditor.
700 1 _aSagan, Scott D.,
_eeditor.
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tCOR eBook Package 2011-2017
_z9783110536164
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tCOR eBook-Package Pilot Project 2016
_z9783110665895
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tCornell Univ. Press eBook-Package Pilot Project 2016-2017
_z9783110606737
856 4 0 _uhttps://doi.org/10.7591/9781501705946
856 4 2 _3Cover
_uhttps://www.degruyter.com/doc/cover/9781501705946.jpg
912 _aEBA_CL_SN
912 _aPDA11SSHE
912 _aPDA12STME
912 _aPDA13ENGE
912 _aPDA14ALL
912 _aPDA15STM
912 _aPDA16SSH
912 _aPDA17SSHEE
912 _aPDA18STMEE
912 _aPDA1ALL
912 _aPDA2
912 _aPDA2HUM
912 _aPDA3STM
912 _aPDA5EBK
912 _aPDA7ENG
912 _a978-3-11-053616-4 COR eBook Package 2011-2017
_c2011
_d2017
912 _a978-3-11-060673-7 Cornell Univ. Press eBook-Package Pilot Project 2016-2017
_c2016
_d2017
912 _a978-3-11-066589-5 COR eBook-Package Pilot Project 2016
912 _aGBV-deGruyter-alles
999 _c49069
_d49069