LEADER 03182oam 2200649I 450 001 9910452081203321 005 20200520144314.0 010 $a0-429-25147-5 010 $a1-4665-6656-6 010 $a1-4398-7293-7 024 7 $a10.1201/b12063 035 $a(CKB)2550000000101321 035 $a(EBL)919028 035 $a(OCoLC)794328338 035 $a(SSID)ssj0000651654 035 $a(PQKBManifestationID)12234666 035 $a(PQKBTitleCode)TC0000651654 035 $a(PQKBWorkID)10623394 035 $a(PQKB)11034683 035 $a(MiAaPQ)EBC919028 035 $a(CaSebORM)9781439872932 035 $a(Au-PeEL)EBL919028 035 $a(CaPaEBR)ebr10562534 035 $a(CaONFJC)MIL544806 035 $a(EXLCZ)992550000000101321 100 $a20180331d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aManaging the insider threat $eno dark corners /$fNick Catrantzos 205 $a1st edition 210 1$aBoca Raton, Fla. :$cCRC Press,$d2012. 215 $a1 online resource (357 p.) 300 $aDescription based upon print version of record. 311 $a1-4398-7292-9 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Contents; Foreword; Preface; Author; Chapter 1 - The Problem and Limits of Accepted Wisdom; Chapter 2 - New Research and Contrarian Findings; Chapter 5 - Rethinking Background Investigations; Chapter 6 - Deception and the Insider Threat; Chapter 7 - Lawful Disruption of the Insider Threat; Chapter 8 - Existential Insider Threats; Chapter 9 - Other Insider Threats; Chapter 10 - Consulting for No Dark Corners Implementation; Chapter 11 - Answer Guide; Appendix A: Three Rounds of Delphi Questions; Appendix B: Summary of Delphi Round 1 Findings Accompanying Round 2 Questions 327 $aAppendix C: Summary of Delphi Round 2 Findings Accompanying Round 3 QuestionsAppendix D: Delphi Expert Comments and Stories; Back Cover 330 $aAn adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail against these trust betrayers. In this groundbreaking book, author Nick Catrantzos identifies new management, security, and workplace strategies for categorizing and defeating insider threats.The book begins with proble 606 $aCorporations$xSecurity measures 606 $aEmployee crimes$xPrevention 606 $aSabotage in the workplace$xPrevention 608 $aElectronic books. 615 0$aCorporations$xSecurity measures. 615 0$aEmployee crimes$xPrevention. 615 0$aSabotage in the workplace$xPrevention. 676 $a658.4/73 700 $aCatrantzos$b Nick.$0948495 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452081203321 996 $aManaging the insider threat$92144065 997 $aUNINA