{"id":"https://openalex.org/W3211065488","doi":"https://doi.org/10.1007/s10111-021-00690-z","title":"Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks","display_name":"Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks","publication_year":2021,"publication_date":"2021-10-28","ids":{"openalex":"https://openalex.org/W3211065488","doi":"https://doi.org/10.1007/s10111-021-00690-z","mag":"3211065488","pmid":"https://pubmed.ncbi.nlm.nih.gov/34725543"},"language":"en","primary_location":{"id":"doi:10.1007/s10111-021-00690-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10111-021-00690-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10111-021-00690-z.pdf","source":{"id":"https://openalex.org/S113222589","display_name":"Cognition Technology & Work","issn_l":"1435-5558","issn":["1435-5558","1435-5566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cognition, Technology &amp; Work","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10111-021-00690-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028881811","display_name":"Neeshe Khan","orcid":"https://orcid.org/0000-0003-3962-7305"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Neeshe Khan","raw_affiliation_strings":["University of Nottingham, Nottingham, UK"],"raw_orcid":"https://orcid.org/0000-0003-3962-7305","affiliations":[{"raw_affiliation_string":"University of Nottingham, Nottingham, UK","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075066128","display_name":"Robert Houghton","orcid":"https://orcid.org/0000-0001-7334-8567"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert J. Houghton","raw_affiliation_strings":["University of Nottingham, Nottingham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Nottingham, Nottingham, UK","institution_ids":["https://openalex.org/I142263535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054151701","display_name":"Sarah Sharples","orcid":"https://orcid.org/0000-0003-0288-915X"},"institutions":[{"id":"https://openalex.org/I142263535","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58","country_code":"GB","type":"education","lineage":["https://openalex.org/I142263535"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sarah Sharples","raw_affiliation_strings":["University of Nottingham, Nottingham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Nottingham, Nottingham, UK","institution_ids":["https://openalex.org/I142263535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028881811"],"corresponding_institution_ids":["https://openalex.org/I142263535"],"apc_list":{"value":2490,"currency":"EUR","value_usd":3090},"apc_paid":{"value":2490,"currency":"EUR","value_usd":3090},"fwci":3.6973,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.93899267,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"24","issue":"3","first_page":"393","last_page":"421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.6550927758216858},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5898301005363464},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.472598135471344},{"id":"https://openalex.org/keywords/environmental-health","display_name":"Environmental health","score":0.44345685839653015},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3457532525062561},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3320271372795105},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.22389084100723267},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.14514103531837463},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08785372972488403}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.6550927758216858},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5898301005363464},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.472598135471344},{"id":"https://openalex.org/C99454951","wikidata":"https://www.wikidata.org/wiki/Q932068","display_name":"Environmental health","level":1,"score":0.44345685839653015},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3457532525062561},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3320271372795105},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.22389084100723267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14514103531837463},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08785372972488403},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/s10111-021-00690-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10111-021-00690-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10111-021-00690-z.pdf","source":{"id":"https://openalex.org/S113222589","display_name":"Cognition Technology & Work","issn_l":"1435-5558","issn":["1435-5558","1435-5566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cognition, Technology &amp; Work","raw_type":"journal-article"},{"id":"pmid:34725543","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/34725543","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cognition, technology & work (Online)","raw_type":null},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/a69afa7d-788f-49d7-9877-8ddd55e4a678","is_oa":false,"landing_page_url":"https://research.manchester.ac.uk/en/publications/a69afa7d-788f-49d7-9877-8ddd55e4a678","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Khan, N, Houghton, R & Sharples, S 2022, 'Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks', Cognition, Technology and Work, vol. 24, pp. 393-421. https://doi.org/10.1007/s10111-021-00690-z","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pubmedcentral.nih.gov:8550909","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/8550909","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cogn Technol Work","raw_type":"Text"},{"id":"pmh:oai:pure.atira.dk:publications/a69afa7d-788f-49d7-9877-8ddd55e4a678","is_oa":true,"landing_page_url":"https://nottingham-repository.worktribe.com/output/6506158","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khan, N, Houghton, R & Sharples, S 2022, 'Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks', Cognition, Technology and Work, vol. 24, pp. 393-421. https://doi.org/10.1007/s10111-021-00690-z","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/s10111-021-00690-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10111-021-00690-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10111-021-00690-z.pdf","source":{"id":"https://openalex.org/S113222589","display_name":"Cognition Technology & Work","issn_l":"1435-5558","issn":["1435-5558","1435-5566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cognition, Technology &amp; Work","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2094331273","display_name":null,"funder_award_id":"EP/L015463/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G2250185850","display_name":"EPSRC Centre for Doctoral Training in My Life in Data","funder_award_id":"EP/L015463/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2774304232","display_name":null,"funder_award_id":"Grant No. EP/L015463/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G3790499776","display_name":null,"funder_award_id":"EP/L015463/1","funder_id":"https://openalex.org/F4320320324","funder_display_name":"University of Nottingham"},{"id":"https://openalex.org/G4434080624","display_name":null,"funder_award_id":"EP/G065802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6136994381","display_name":null,"funder_award_id":"EP/T022493/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7810292024","display_name":"Horizon: Digital Economy Hub at the University of Nottingham","funder_award_id":"EP/G065802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7856825579","display_name":null,"funder_award_id":"EP/M02315X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7941153177","display_name":null,"funder_award_id":"EP/G065802/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"}],"funders":[{"id":"https://openalex.org/F4320314731","display_name":"UK Research and Innovation","ror":"https://ror.org/001aqnf71"},{"id":"https://openalex.org/F4320320324","display_name":"University of Nottingham","ror":"https://ror.org/01ee9ar58"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3211065488.pdf","grobid_xml":"https://content.openalex.org/works/W3211065488.grobid-xml"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W43120215","https://openalex.org/W119656196","https://openalex.org/W170227986","https://openalex.org/W1458873377","https://openalex.org/W1494832820","https://openalex.org/W1523093010","https://openalex.org/W1605965041","https://openalex.org/W1646742026","https://openalex.org/W1678518841","https://openalex.org/W1688060233","https://openalex.org/W1967679139","https://openalex.org/W1967847731","https://openalex.org/W1969795119","https://openalex.org/W1983744983","https://openalex.org/W1995639818","https://openalex.org/W2022158449","https://openalex.org/W2026645894","https://openalex.org/W2033640190","https://openalex.org/W2044667601","https://openalex.org/W2070841423","https://openalex.org/W2078108772","https://openalex.org/W2080363292","https://openalex.org/W2080862045","https://openalex.org/W2092336687","https://openalex.org/W2098490387","https://openalex.org/W2100407515","https://openalex.org/W2109190320","https://openalex.org/W2123521920","https://openalex.org/W2129043741","https://openalex.org/W2145052282","https://openalex.org/W2146691185","https://openalex.org/W2152026253","https://openalex.org/W2153038337","https://openalex.org/W2165532165","https://openalex.org/W2168393938","https://openalex.org/W2169889946","https://openalex.org/W2206818914","https://openalex.org/W2329395632","https://openalex.org/W2464495822","https://openalex.org/W2553160602","https://openalex.org/W2580631045","https://openalex.org/W2794446551","https://openalex.org/W2885040798","https://openalex.org/W2888160480","https://openalex.org/W2902026952","https://openalex.org/W2904235735","https://openalex.org/W2945040420","https://openalex.org/W3025540484","https://openalex.org/W3041204984","https://openalex.org/W3044016611","https://openalex.org/W4240615482","https://openalex.org/W6940885863"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2075012963"],"abstract_inverted_index":{"The":[0],"exploitation":[1],"of":[2,43,50,53,68,83,115,121,130,156,170,184,190,219],"so-called":[3],"insiders":[4],"is":[5,187],"increasingly":[6],"recognised":[7],"as":[8],"a":[9,51,177,188],"common":[10],"vector":[11],"for":[12,181,200],"cyberattacks.":[13],"Emerging":[14],"work":[15,37,161,186],"in":[16,80,112,165,193,215],"this":[17,36,185],"area":[18],"has":[19],"considered":[20],"the":[21,27,29,32,48,81,113,119,150,160,168,182,216],"phenomenon":[22],"from":[23],"various":[24,66],"perspectives":[25],"including":[26],"technological,":[28],"psychological":[30],"and":[31,46,102,136,159],"sociotechnical.":[33],"We":[34,72,173,205],"extend":[35],"by":[38,175],"specifically":[39],"examining":[40],"unintentional":[41,105,202],"forms":[42,67],"insider":[44,203],"threat":[45],"report":[47],"outcomes":[49],"series":[52],"detailed":[54],"Critical":[55],"Decision":[56],"Method":[57],"(CDM)":[58],"led":[59],"interviews":[60],"with":[61],"those":[62,220],"who":[63,221],"have":[64,222],"experienced":[65],"unwitting":[69],"cybersecurity":[70],"breaches.":[71],"also":[73,206],"articulate":[74],"factors":[75],"likely":[76],"to":[77,91,124,143,148,196,210,225],"contribute":[78],"firmly":[79],"context":[82],"everyday":[84],"work-as-done.":[85],"CDM's":[86],"probing":[87],"questions":[88],"were":[89,110],"used":[90],"elicit":[92],"expert":[93],"knowledge":[94],"around":[95],"how":[96],"decision":[97,131],"making":[98],"occurred":[99],"prior,":[100],"during":[101],"post":[103],"an":[104,145],"cyber":[106,171],"breach":[107],"whilst":[108],"participants":[109],"engaged":[111],"delivery":[114],"cognitive":[116],"tasks.":[117],"Through":[118],"application":[120],"grounded":[122],"theory":[123],"data,":[125],"emerging":[126],"results":[127,140],"included":[128],"themes":[129],"making,":[132],"task":[133],"factors,":[134],"accidents":[135],"organisational":[137],"factors.":[138],"These":[139],"are":[141],"utilised":[142],"inform":[144],"Epidemiological":[146],"Triangle":[147],"represent":[149],"dynamic":[151],"relationship":[152],"between":[153],"three":[154],"vectors":[155],"exploit,":[157],"user":[158],"environment":[162],"that":[163],"can":[164],"turn":[166],"affect":[167],"resilience":[169],"defences.":[172],"conclude":[174],"presenting":[176],"simple":[178],"framework,":[179],"which":[180],"purposes":[183],"set":[189],"recommendations":[191],"applicable":[192],"specific":[194],"scenarios":[195],"reduce":[197],"negative":[198],"impact":[199],"understanding":[201],"threats.":[204],"suggest":[207],"practical":[208],"means":[209],"counteract":[211],"such":[212],"threats":[213],"rooted":[214],"lived":[217],"experience":[218],"fallen":[223],"prey":[224],"them.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
