<?xml version="1.0"?>
<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Auditor</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Auditor</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Аудитор</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">1998-0701</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">55231</article-id>
   <article-id pub-id-type="doi">10.12737/1998-0701-2022-8-10-36-40</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Экономическая безопасность</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Economic security</subject>
    </subj-group>
    <subj-group>
     <subject>Экономическая безопасность</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Assessment of Insider Threats in the Personnel Security System of the Organization</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Оценка инсайдерских угроз в системе кадровой безопасности организации</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Симонин</surname>
       <given-names>П. В.</given-names>
      </name>
      <name xml:lang="en">
       <surname>Simonin</surname>
       <given-names>P. V.</given-names>
      </name>
     </name-alternatives>
     <bio xml:lang="ru">
      <p>кандидат экономических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of economic sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Курбацкая</surname>
       <given-names>Т. Б.</given-names>
      </name>
      <name xml:lang="en">
       <surname>Kurbackaya</surname>
       <given-names>T. B.</given-names>
      </name>
     </name-alternatives>
     <bio xml:lang="ru">
      <p>кандидат психологических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of psychological sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Сизов</surname>
       <given-names>П. Т.</given-names>
      </name>
      <name xml:lang="en">
       <surname>Sizov</surname>
       <given-names>P. T.</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-3"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Финансовый университет при Правительстве Российской Федерации</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Financial University under the Government of the Russian Federation</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">РОАТ Российский университет транспорта</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">ROAT Russian University of Transport</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-3">
    <aff>
     <institution xml:lang="ru">РОАТ Российский университет транспорта</institution>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">ROAT Russian University of Transport</institution>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2022-12-01T16:32:36+03:00">
    <day>01</day>
    <month>12</month>
    <year>2022</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2022-12-01T16:32:36+03:00">
    <day>01</day>
    <month>12</month>
    <year>2022</year>
   </pub-date>
   <volume>8</volume>
   <issue>10</issue>
   <fpage>36</fpage>
   <lpage>40</lpage>
   <history>
    <date date-type="received" iso-8601-date="2022-11-23T00:00:00+03:00">
     <day>23</day>
     <month>11</month>
     <year>2022</year>
    </date>
   </history>
   <self-uri xlink:href="https://zh-szf.ru/en/nauka/article/55231/view">https://zh-szf.ru/en/nauka/article/55231/view</self-uri>
   <abstract xml:lang="ru">
    <p>В статье рассматриваются проблемы и пути решения инсайдерских угроз в системе кадровой безопасности организации и доказывается, что персонал организации нуждается в защите и одновременно может выступать источником угроз и опасностей. Обосновывается необходимость использования методики оценки инсайдерских угроз в системе кадровой безопасность на основе выделения групп  инсайдеров: фактических работников, ранее высвобожденного персонала, деловых партнеров и других пользователей.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The article discusses the problems and ways of solving insider threats in the organization's per-sonnel security system, proves that at the same time the organization’s personnel needs protec-tion, and can act as a source of threats and dangers. The necessity of using a methodology for assessing insider threats in the personnel security system based on the identification of a group of insiders: actual employees, previously released personnel, business partners and other users is sub-stantiated.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>инсайдерские угрозы</kwd>
    <kwd>экономическая безопасность</kwd>
    <kwd>проприетарная информация</kwd>
    <kwd>кадровая безопасность</kwd>
    <kwd>персонал</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>insider threats</kwd>
    <kwd>economic security</kwd>
    <kwd>proprietary information</kwd>
    <kwd>personnel security</kwd>
    <kwd>personnel</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ивашкина, А. В. Угрозы в кадровой безопасности и методы по их предотвращению / А. В. Ивашкина, У. П. Лебедева // Евразийский союз ученых. - 2018. - № 4-6(49). - С. 71-77.</mixed-citation>
     <mixed-citation xml:lang="en">Ivashkina, A. V. Ugrozy v kadrovoy bezopasnosti i metody po ih predotvrascheniyu / A. V. Ivashkina, U. P. Lebedeva // Evraziyskiy soyuz uchenyh. - 2018. - № 4-6(49). - S. 71-77.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Мешкова, И. В. Кадровая безопасность в системе национальной безопасности России / И. В. Мешкова // Миссия конфессий. - 2021. - Т. 10. - № 8(57). - С. 907-913.</mixed-citation>
     <mixed-citation xml:lang="en">Meshkova, I. V. Kadrovaya bezopasnost' v sisteme nacional'noy bezopasnosti Rossii / I. V. Meshkova // Missiya konfessiy. - 2021. - T. 10. - № 8(57). - S. 907-913.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Молчанов, М. А. Кадровая безопасность как элемент экономической безопасности пред-приятий производственных отраслей / М. А. Молчанов // Мир современной науки. - 2014. - № 3(25). - С. 71-73.</mixed-citation>
     <mixed-citation xml:lang="en">Molchanov, M. A. Kadrovaya bezopasnost' kak element ekonomicheskoy bezopasnosti pred-priyatiy proizvodstvennyh otrasley / M. A. Molchanov // Mir sovremennoy nauki. - 2014. - № 3(25). - S. 71-73.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Утечки данных в России. URL: https://www.tadviser.ru/index.php (дата обращения: 10.10.2022)</mixed-citation>
     <mixed-citation xml:lang="en">Utechki dannyh v Rossii. URL: https://www.tadviser.ru/index.php (data obrascheniya: 10.10.2022)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">DWP Personnel Security Policy.- URL: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1050599/dwp-personnel-security-policy-version-2.pdf (дата обращения: 10.09.2022)</mixed-citation>
     <mixed-citation xml:lang="en">DWP Personnel Security Policy.- URL: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1050599/dwp-personnel-security-policy-version-2.pdf (data obrascheniya: 10.09.2022)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ko, Li &amp; Divakaran, Dinil Mon &amp; Liau, Yung &amp; Thing, Vrizlynn. (2016). Insider Threat Detec-tion and its Future Directions. International Journal of Security and Networks. 12. 10.1504/IJSN.2017.10005217.</mixed-citation>
     <mixed-citation xml:lang="en">Ko, Li &amp; Divakaran, Dinil Mon &amp; Liau, Yung &amp; Thing, Vrizlynn. (2016). Insider Threat Detec-tion and its Future Directions. International Journal of Security and Networks. 12. 10.1504/IJSN.2017.10005217.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Koizumi, Hideaki. (2015). Engineering for Human Security and Well-Being. Engineering. 1. 282. 10.15302/J-ENG-2015066.</mixed-citation>
     <mixed-citation xml:lang="en">Koizumi, Hideaki. (2015). Engineering for Human Security and Well-Being. Engineering. 1. 282. 10.15302/J-ENG-2015066.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">La identificación del sujeto-objeto de amenazas a la seguridad personal / Svetlana V. LOBOVA; Aleksei V. BOGOVIZ // Espacios. Vol. 39 (Number 24). Year 2018.Page 34. - URL: https://www.revistaespacios.com/a18v39n24/a18v39n24p34.pdf (дата обращения: 15.09.2022)</mixed-citation>
     <mixed-citation xml:lang="en">La identificación del sujeto-objeto de amenazas a la seguridad personal / Svetlana V. LOBOVA; Aleksei V. BOGOVIZ // Espacios. Vol. 39 (Number 24). Year 2018.Page 34. - URL: https://www.revistaespacios.com/a18v39n24/a18v39n24p34.pdf (data obrascheniya: 15.09.2022)</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mazzarolo, Guerrino &amp; Jurcut, Anca. (2019). Insider threats in Cyber Security: The enemy within the gates.</mixed-citation>
     <mixed-citation xml:lang="en">Mazzarolo, Guerrino &amp; Jurcut, Anca. (2019). Insider threats in Cyber Security: The enemy within the gates.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organiza-tion / Jawon Kim, Jaesoo Kim and Hangbae Chang. - DOI: 10.3390/su12156217 // Sustainabil-ity. - 2020. - 12, 6217.</mixed-citation>
     <mixed-citation xml:lang="en">Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organiza-tion / Jawon Kim, Jaesoo Kim and Hangbae Chang. - DOI: 10.3390/su12156217 // Sustainabil-ity. - 2020. - 12, 6217.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Fan, Wenjun &amp; Lwakatare, Kevin &amp; Rong, Rong. (2017). Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations. International Journal of Computer Network and Information Security. 09. 1-11. 10.5815/ijcnis.2017.01.01.</mixed-citation>
     <mixed-citation xml:lang="en">Fan, Wenjun &amp; Lwakatare, Kevin &amp; Rong, Rong. (2017). Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations. International Journal of Computer Network and Information Security. 09. 1-11. 10.5815/ijcnis.2017.01.01.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
