دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.]
نویسندگان: Eric Shaw
سری:
ISBN (شابک) : 1032482486, 9781032482484
ناشر: CRC Press
سال نشر: 2023
تعداد صفحات: 204
[222]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 10 Mb
در صورت تبدیل فایل کتاب The Psychology of Insider Risk: Detection, Investigation and Case Management به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب روانشناسی ریسک خودی: تشخیص، بررسی و مدیریت پرونده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
اریک شاو، روانشناس بالینی و افسر اطلاعاتی سابق، بیش از 30 سال تجربه مشاوره روانشناختی را برای جامعه امنیت ملی، تحقیقات شرکتی و اجرای قانون برای این کار در مورد خطرات داخلی به ارمغان می آورد. همچنین به تشریح بسیاری از چالشهای فعلی و آینده که متخصصان ریسک داخلی با آنها مواجه هستند، میپردازد.
Clinical Psychologist and former intelligence officer Eric Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. It also outlines the many current and future challenges insider risk professionals face.
Cover Half Title Title Page Copyright Page Table of Contents Acknowledgments About the author Introduction Note Chapter 1: Three cases, three roles 1.1 Lessons learned Notes Chapter 2: Overview of the Critical Pathway to Insider Risk (CPIR) framework 2.1 Introduction to the CPIR 2.2 Critical pathway components 2.2.1 Personal predispositions 2.2.1.1 Medical/psychiatric disorders 2.2.1.2 Personality disorders, social skills problems or biased decision-making 2.2.1.3 History of rule violations 2.2.1.4 Social network risks 2.2.2 Stressors 2.2.2.1 Personal stressors 2.2.2.2 Professional stressors 2.2.2.3 Financial stressors 2.2.2.4 Organizational stressors 2.2.2.5 Community stressors 2.2.3 Concerning behaviors 2.2.4 Problematic organizational responses and subject/organization interaction 2.2.5 Insider crime script 2.2.6 Mitigating factors 2.2.7 A full CPIR case illustration 2.2.7.1 Step one—personal predispositions: medical/psychiatric disorders, personality issues, previous violations and social network risks 2.2.7.2 Step two—stressors become triggers 2.2.7.3 Step three—concerning behaviors: first risk observables 2.2.7.4 Step four—problematic organizational responses: how we react or fail to react leads to risk escalation 2.2.7.5 Step five—crime scripts: planning, rehearsal, recruitment, action 2.2.8 Critique of the CPIR 2.2.9 Implications of the pathway 2.2.10 Accelerators down the pathway Notes Chapter 3: Special drivers down the pathway: Disgruntlement, personality and problematic organizational responses 3.1 Disgruntlement and moral emotions 3.2 Personality and risk 3.2.1 What is personality? 3.2.2 Prominent personality types in insiders 3.2.2.1 Anti-social personalities 3.2.2.2 Narcissistic personalities (NP) 3.2.2.3 Combined NP and obsessive-compulsive personality disorder (OCPD) characteristics 3.2.3 Problematic organizational responses 3.2.3.1 Lack of risk awareness 3.2.3.2 Risk awareness but failure to investigate 3.2.3.3 Investigate but fail to act 3.2.3.4 Act in a way that escalates rather than reduces insider risk Notes Chapter 4: Investigative tools—the CPIR risk score 4.1 The CPIR and a corporate leak case 4.2 A note on leakers 4.3 Back to the corporate case Notes Chapter 5: Psycholinguistic tools 5.1 Psycholinguistics in intelligence and investigative work 5.2 Finding the needle in the haystack 5.2.1 What should we look for? 5.2.2 Understanding a subject we have found 5.3 Insights into personality and decision-making Notes Chapter 6: Case study of cyber extortion and mass destruction violence risk 6.1 How Many Authors? Notes Chapter 7: Putting together the CPIR and psycholinguistics—corporate leaks and erotomania 7.1 Psycholinguistics in leak investigations 7.2 Erotomania: the bane of executive protection 7.2.1 The case of the depressed former employee 7.2.2 Case management issues 7.3 Psycholinguistics in stalking 7.4 Related tasks: am I communicating with the person I think I’m talking to? Notes Chapter 8: Detecting dangerous extremism versus conspiracy beliefs 8.1 The proliferation and psychological functions of conspiracy beliefs 8.2 Why has extremism become such a problem? 8.3 Extremists on the critical pathway 8.4 What should we look for? Extremists on the critical pathway to insider risk 8.4.1 Disgruntlement and the moral emotions 8.4.2 Personal predispositions 8.4.2.1 Personal predispositions: medical/psychiatric issues and personality and social skills problems 8.4.2.1.1 Psychological risk and extremism 8.4.2.2 Personality and social skills 8.4.2.3 Personal predispositions: previous violations 8.4.2.4 Personal predispositions: social network risks 8.4.3 Stress and identity uncertainty 8.4.4 Concerning behaviors 8.4.5 Problematic Organizational Responses (PORs) 8.4.5.1 Lack of extremist risk awareness 8.4.5.2 Aware of risk but fail to investigate 8.4.5.3 Investigate but fail to act 8.4.5.4 Act in a manner that escalates extremist risk 8.4.5.5 Over-reaction—creating greater radicalization 8.4.5.6 Avoiding both under- and over-reacting: limit-setting, leverage and HR acrobatics 8.4.6 Crime scripts 8.4.7 Mitigating factors 8.5 Summary and recommendations for management of extremist challenges 8.5.1 Recommendations 8.5.1.1 Seed awareness to our network peers and referral sources Notes Chapter 9: Reflections, summary and challenges 9.1 Reflections on this form of professional practice 9.1.1 The practice of monitoring employees through their communications has changed 9.1.2 Benevolent big brother is still big brother—is the intrusion worth the risk? 9.2 Summary 9.2.1 The CPIR 9.2.2 Accelerators down the pathway 9.2.3 Real-world applications 9.2.4 Case consultations—responding to investigator questions 9.2.5 Searching for the unknown subject and monitoring erotomania 9.2.6 Conspiracy theories and extremism on the critical pathway 9.3 Challenges looking ahead 9.3.1 Model and method evolution 9.3.2 Services to those in need 9.3.3 Recognizing suicidal cognitions as an insider risk gateway 9.3.4 Therapy may not always be the answer 9.3.5 Insider risk in our elections 9.3.6 When the insider is the leader 9.3.7 Good management is the secret to successful insider risk prevention Notes Additional references Index