REFERENCES
- Abd Jalil, J., & Hassan, H. (2020). Protecting trade secrets from theft and corporate espionage: Some legal and administrative measures. International Journal of Business and Society, 21(1), 205–218.
- Akopyan, D. A., & Yelyakov, A. D. (2009, October). Cybercrimes in the information structure of society: A survey. Scientific and Technical Information Processing, 36(6), 338–350. https://doi.org/10.3103/S0147688209060057
- Bressler, M. S., & Bressler, L. (2015). Protecting your company’s intellectual property assets from cyber-espionage. Journal of Legal, Ethical and Regulatory Issues, 18(1), 21–34.
- Federation of American Science. (1995). Annual report to congress on foreign economic collection and industrial espionage. https://fas.org
- Greitzer, F. L., & Hohimer, R. E. (2011). Modeling human behavior to anticipate insider attacks. Journal of Strategic Security, 4(2), 25–48. https://doi.org/10.5038/1944-0472.4.2.2
- Heider, F. (1944). Social perception and phenomenal causality. Psychological Review, 51, 358–374.
- Ho, S., Kaarst-Brown, M., & Benbasat, I. (2018). Trustworthiness attribution: Inquiry into insider threat detection. Journal of the Association for Information Science and Technology, 69(2), 271–280. https://doi.org/10.1002/asi.23938
- Ho, S. M., & Benbasat, I. (2014). Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations. Journal of the Association for Information Science and Technology, 65, 1555–1576.
- Ho, S. M., Hancock, J. T., & Booth, C. (2017). Ethical dilemma: Deception dynamics in computer-medicated group communication. Journal of the American Society for Information Science and Technology, 68, 2729–2742.
- Ho, S. M., Hancock, J. T., Booth, C., & Liu, X. (2016). Computer-mediated deception: Revealed by language-action cues in spontaneous communication. Journal of Management Information Systems, 33, 393–420.
- Ho, S. M., & Warkentin, M. (2017). Leader’s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19, 377–396.
- Hubbard, T., Weber, G. L., & Steinhoff, J. C. (2017, Fall). Protecting data assets in a perilous cyber world. Journal of Government Financial Management, 26–31.
- Iovan, S., & Iovan, A. A. (2016, December). From cyber threat to cyber-crime. Romanian Economic Business Review, Romanian-American University, 10(2), 425–434.
- Jacobs, P., Solms, S. V., & Grobler, M. (2016). E-CMIRC: Towards a model for the integration of services between SOCs and CSIRTs, conference. 15th European Conference on Cyber Warfare and Security, Munich, Germany.
- Kelley, H. H. (1973). The process of causal attribution. American Psychology, 28, 107–128.
- Krasznay, C., & Hamornik, B. (2018). Analysis of cyberattack patterns by user behavior analytics. AARMS, 17(3), 101–114.
- Krekel, B., Adams, P., & Bakos, G. (2012, March 7). Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. U.S.-China Economic and Security Review Commission (Northrop Grumman Corp).
- Kumar, G., & Kumar, K. (2014). Network security – An updated perspective. Systems Science & Control Engineering: An Open Access Journal, 2(1), 325–334. https://doi.org/10.1080/21642583.2014.895969
- Laska, A., Johnson, B., Schottle, P., Grossklags, J., & Bohme, R. (2014, October). Secure team composition to thwart insider threats and cyber-espionage. ACM Transactions on Internet Technology, 14(2–3), Art 19.
- Maybury, M., Chase, P., Cheikes, B., Brackney, D., Matzner, S., Hetherington, T., Wood, B., Sibley, C., Marin, J., Longstaff, T., Spitzner, L., Copeland, J., & Lewandowski, S. (2005). Analysis and detection of malicious insiders. International Conference on Intelligence Analysis, McLean, VA.
- Mazzarolo, G., & Jurcut, A. D. (2019, November). Insider threats in cybersecurity: The enemy within the gates. Analysis, 6(1), 57–63.
- Merritt, D., & Mullins, B. (2011, January). Identifying cyber espionage: Towards a synthesis Approach. Proceedings of the International Conference on Information Warfare, 180.
- National Counterintelligence and Security Center. (2018). Foreign economic espionage in cyberspace. Office of the Director of National Intelligence.
- National Counterintelligence Center. (2000). Annual report to congress on foreign economic collection and industrial espionage.
- O’Hara, G. (2010). Cyber-espionage: Growing threat to the American economy. CommLaw Conspectus: Journal of Communications Law and Policy, 19(1), 241–276.
- Probst, C. W., Hunker, J., Bishop, M., & Gollmann, D. (2010). Review of insider threats in cyber security. ACM SIGACT News, (June 2012), 43(2), 38–40. https://doi.org/10.1145/2261417.2261428
- Schwarz, N. (2015). Metacognition. In M. Mikulincer, P. R. Shaver, E. Borgida, & J. A. Bargh (Eds.), APA handbook of personality and social psychology: Attitudes and social cognition (Vol. 1, pp. 203–229). Washington, DC: American Psychological Association.
- Smith, R. W., & Schwarz, N. (2016). Metacognitive inferences from other people’s memory performance. Journal of Experimental Psychology: Applied, 22, 285–294.
- Torre, M., Dumay, J., & Rea, M. (2018). Breaching intellectual capital: Critical reflections on Big Data security. Meditari Accountancy Research, 26(3), 463–482. https://doi.org/10.1108/MEDAR-06-2017-0154
- Wall, D. S. (2012). Enemies within: Redefining the insider threat in organizational security policy. Security Journal, 26, 107–124.
- Wangen, G. (2015). The role of malware in reported cyber espionage: A review of the impact and mechanism. Information, 6(2), 183–211. https://doi.org/10.3390/info6020183
- Winnefeld, J., Kirchhoff, C., & Upton, D. (2015). Cybersecurity’s human factor: Lessons from the pentagon. Harvard Business Review, September, 86–95.