Insider Threats / / ed. by Matthew Bunn, Scott D. Sagan.
High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017 |
---|---|
MitwirkendeR: | |
HerausgeberIn: | |
Place / Publishing House: | Ithaca, NY : : Cornell University Press, , [2017] ©2017 |
Year of Publication: | 2017 |
Language: | English |
Series: | Cornell Studies in Security Affairs
|
Online Access: | |
Physical Description: | 1 online resource (216 p.) :; 1 halftone, 3 tables, 6 charts |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781501705946 |
---|---|
ctrlnum |
(DE-B1597)481728 (OCoLC)967938743 |
collection |
bib_alma |
record_format |
marc |
spelling |
Insider Threats / ed. by Matthew Bunn, Scott D. Sagan. Ithaca, NY : Cornell University Press, [2017] ©2017 1 online resource (216 p.) : 1 halftone, 3 tables, 6 charts text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Cornell Studies in Security Affairs Frontmatter -- Contents -- Contributors -- Acknowledgments -- Introduction: Inside the Insider Threat -- 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- 3. Lessons from the Anthrax Letters -- 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- 6. A Worst Practices Guide to Insider Threats -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022) Nuclear terrorism Prevention United States. Nuclear terrorism Prevention. Terrorism Prevention United States. Terrorism United States Prevention. Terrorism--Prevention--United States. International Studies. Political Science & Political History. POLITICAL SCIENCE / Security (National & International). bisacsh Bunn, Matthew, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Bunn, Matthew, editor. edt http://id.loc.gov/vocabulary/relators/edt Dæhli, Andreas Hoelstad, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Glynn, Kathryn M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Hegghammer, Thomas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Long, Austin, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sagan, Scott D., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Sagan, Scott D., editor. edt http://id.loc.gov/vocabulary/relators/edt Schouten, Ronald, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Stern, Jessica, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Zegart, Amy B., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017 9783110665871 print 9781501705175 https://doi.org/10.7591/9781501705946 https://www.degruyter.com/isbn/9781501705946 Cover https://www.degruyter.com/document/cover/isbn/9781501705946/original |
language |
English |
format |
eBook |
author2 |
Bunn, Matthew, Bunn, Matthew, Bunn, Matthew, Bunn, Matthew, Dæhli, Andreas Hoelstad, Dæhli, Andreas Hoelstad, Glynn, Kathryn M., Glynn, Kathryn M., Hegghammer, Thomas, Hegghammer, Thomas, Long, Austin, Long, Austin, Sagan, Scott D., Sagan, Scott D., Sagan, Scott D., Sagan, Scott D., Schouten, Ronald, Schouten, Ronald, Stern, Jessica, Stern, Jessica, Zegart, Amy B., Zegart, Amy B., |
author_facet |
Bunn, Matthew, Bunn, Matthew, Bunn, Matthew, Bunn, Matthew, Dæhli, Andreas Hoelstad, Dæhli, Andreas Hoelstad, Glynn, Kathryn M., Glynn, Kathryn M., Hegghammer, Thomas, Hegghammer, Thomas, Long, Austin, Long, Austin, Sagan, Scott D., Sagan, Scott D., Sagan, Scott D., Sagan, Scott D., Schouten, Ronald, Schouten, Ronald, Stern, Jessica, Stern, Jessica, Zegart, Amy B., Zegart, Amy B., |
author2_variant |
m b mb m b mb m b mb m b mb a h d ah ahd a h d ah ahd k m g km kmg k m g km kmg t h th t h th a l al a l al s d s sd sds s d s sd sds s d s sd sds s d s sd sds r s rs r s rs j s js j s js a b z ab abz a b z ab abz |
author2_role |
MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR |
author_sort |
Bunn, Matthew, |
title |
Insider Threats / |
spellingShingle |
Insider Threats / Cornell Studies in Security Affairs Frontmatter -- Contents -- Contributors -- Acknowledgments -- Introduction: Inside the Insider Threat -- 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- 3. Lessons from the Anthrax Letters -- 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- 6. A Worst Practices Guide to Insider Threats -- Index |
title_full |
Insider Threats / ed. by Matthew Bunn, Scott D. Sagan. |
title_fullStr |
Insider Threats / ed. by Matthew Bunn, Scott D. Sagan. |
title_full_unstemmed |
Insider Threats / ed. by Matthew Bunn, Scott D. Sagan. |
title_auth |
Insider Threats / |
title_alt |
Frontmatter -- Contents -- Contributors -- Acknowledgments -- Introduction: Inside the Insider Threat -- 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- 3. Lessons from the Anthrax Letters -- 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- 6. A Worst Practices Guide to Insider Threats -- Index |
title_new |
Insider Threats / |
title_sort |
insider threats / |
series |
Cornell Studies in Security Affairs |
series2 |
Cornell Studies in Security Affairs |
publisher |
Cornell University Press, |
publishDate |
2017 |
physical |
1 online resource (216 p.) : 1 halftone, 3 tables, 6 charts Issued also in print. |
contents |
Frontmatter -- Contents -- Contributors -- Acknowledgments -- Introduction: Inside the Insider Threat -- 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- 3. Lessons from the Anthrax Letters -- 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- 6. A Worst Practices Guide to Insider Threats -- Index |
isbn |
9781501705946 9783110665871 9781501705175 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6432 |
callnumber-sort |
HV 46432 |
geographic_facet |
United States |
url |
https://doi.org/10.7591/9781501705946 https://www.degruyter.com/isbn/9781501705946 https://www.degruyter.com/document/cover/isbn/9781501705946/original |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
650 - Management & public relations |
dewey-ones |
658 - General management |
dewey-full |
658.4/73 |
dewey-sort |
3658.4 273 |
dewey-raw |
658.4/73 |
dewey-search |
658.4/73 |
doi_str_mv |
10.7591/9781501705946 |
oclc_num |
967938743 |
work_keys_str_mv |
AT bunnmatthew insiderthreats AT dæhliandreashoelstad insiderthreats AT glynnkathrynm insiderthreats AT hegghammerthomas insiderthreats AT longaustin insiderthreats AT saganscottd insiderthreats AT schoutenronald insiderthreats AT sternjessica insiderthreats AT zegartamyb insiderthreats |
status_str |
n |
ids_txt_mv |
(DE-B1597)481728 (OCoLC)967938743 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017 |
is_hierarchy_title |
Insider Threats / |
container_title |
Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1770177060373790720 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06147nam a22009135i 4500</leader><controlfield tag="001">9781501705946</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220302035458.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220302t20172017nyu fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979968916</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501705946</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7591/9781501705946</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)481728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967938743</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6432</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/73</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Insider Threats /</subfield><subfield code="c">ed. by Matthew Bunn, Scott D. Sagan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca, NY : </subfield><subfield code="b">Cornell University Press, </subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (216 p.) :</subfield><subfield code="b">1 halftone, 3 tables, 6 charts</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cornell Studies in Security Affairs</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Contributors -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction: Inside the Insider Threat -- </subfield><subfield code="t">1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- </subfield><subfield code="t">2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- </subfield><subfield code="t">3. Lessons from the Anthrax Letters -- </subfield><subfield code="t">4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- </subfield><subfield code="t">5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- </subfield><subfield code="t">6. A Worst Practices Guide to Insider Threats -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Nuclear terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Nuclear terrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism--Prevention--United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Political Science & Political History.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bunn, Matthew, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bunn, Matthew, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dæhli, Andreas Hoelstad, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Glynn, Kathryn M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hegghammer, Thomas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Austin, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagan, Scott D., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagan, Scott D., </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schouten, Ronald, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stern, Jessica, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zegart, Amy B., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Cornell University Press Complete eBook-Package 2017</subfield><subfield code="z">9783110665871</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501705175</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.7591/9781501705946</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781501705946</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781501705946/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-066587-1 Cornell University Press Complete eBook-Package 2017</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |