Insider Threats / / ed. by Matthew Bunn, Scott D. Sagan.

High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017
MitwirkendeR:
HerausgeberIn:
Place / Publishing House:Ithaca, NY : : Cornell University Press, , [2017]
©2017
Year of Publication:2017
Language:English
Series:Cornell Studies in Security Affairs
Online Access:
Physical Description:1 online resource (216 p.) :; 1 halftone, 3 tables, 6 charts
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781501705946
ctrlnum (DE-B1597)481728
(OCoLC)967938743
collection bib_alma
record_format marc
spelling Insider Threats / ed. by Matthew Bunn, Scott D. Sagan.
Ithaca, NY : Cornell University Press, [2017]
©2017
1 online resource (216 p.) : 1 halftone, 3 tables, 6 charts
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Cornell Studies in Security Affairs
Frontmatter -- Contents -- Contributors -- Acknowledgments -- Introduction: Inside the Insider Threat -- 1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- 2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- 3. Lessons from the Anthrax Letters -- 4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- 5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- 6. A Worst Practices Guide to Insider Threats -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)
Nuclear terrorism Prevention United States.
Nuclear terrorism Prevention.
Terrorism Prevention United States.
Terrorism United States Prevention.
Terrorism--Prevention--United States.
International Studies.
Political Science & Political History.
POLITICAL SCIENCE / Security (National & International). bisacsh
Bunn, Matthew, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Bunn, Matthew, editor. edt http://id.loc.gov/vocabulary/relators/edt
Dæhli, Andreas Hoelstad, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Glynn, Kathryn M., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Hegghammer, Thomas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Long, Austin, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sagan, Scott D., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sagan, Scott D., editor. edt http://id.loc.gov/vocabulary/relators/edt
Schouten, Ronald, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Stern, Jessica, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Zegart, Amy B., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017 9783110665871
print 9781501705175
https://doi.org/10.7591/9781501705946
https://www.degruyter.com/isbn/9781501705946
Cover https://www.degruyter.com/document/cover/isbn/9781501705946/original
language English
format eBook
author2 Bunn, Matthew,
Bunn, Matthew,
Bunn, Matthew,
Bunn, Matthew,
Dæhli, Andreas Hoelstad,
Dæhli, Andreas Hoelstad,
Glynn, Kathryn M.,
Glynn, Kathryn M.,
Hegghammer, Thomas,
Hegghammer, Thomas,
Long, Austin,
Long, Austin,
Sagan, Scott D.,
Sagan, Scott D.,
Sagan, Scott D.,
Sagan, Scott D.,
Schouten, Ronald,
Schouten, Ronald,
Stern, Jessica,
Stern, Jessica,
Zegart, Amy B.,
Zegart, Amy B.,
author_facet Bunn, Matthew,
Bunn, Matthew,
Bunn, Matthew,
Bunn, Matthew,
Dæhli, Andreas Hoelstad,
Dæhli, Andreas Hoelstad,
Glynn, Kathryn M.,
Glynn, Kathryn M.,
Hegghammer, Thomas,
Hegghammer, Thomas,
Long, Austin,
Long, Austin,
Sagan, Scott D.,
Sagan, Scott D.,
Sagan, Scott D.,
Sagan, Scott D.,
Schouten, Ronald,
Schouten, Ronald,
Stern, Jessica,
Stern, Jessica,
Zegart, Amy B.,
Zegart, Amy B.,
author2_variant m b mb
m b mb
m b mb
m b mb
a h d ah ahd
a h d ah ahd
k m g km kmg
k m g km kmg
t h th
t h th
a l al
a l al
s d s sd sds
s d s sd sds
s d s sd sds
s d s sd sds
r s rs
r s rs
j s js
j s js
a b z ab abz
a b z ab abz
author2_role MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
author_sort Bunn, Matthew,
title Insider Threats /
spellingShingle Insider Threats /
Cornell Studies in Security Affairs
Frontmatter --
Contents --
Contributors --
Acknowledgments --
Introduction: Inside the Insider Threat --
1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities --
2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies --
3. Lessons from the Anthrax Letters --
4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan --
5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries --
6. A Worst Practices Guide to Insider Threats --
Index
title_full Insider Threats / ed. by Matthew Bunn, Scott D. Sagan.
title_fullStr Insider Threats / ed. by Matthew Bunn, Scott D. Sagan.
title_full_unstemmed Insider Threats / ed. by Matthew Bunn, Scott D. Sagan.
title_auth Insider Threats /
title_alt Frontmatter --
Contents --
Contributors --
Acknowledgments --
Introduction: Inside the Insider Threat --
1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities --
2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies --
3. Lessons from the Anthrax Letters --
4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan --
5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries --
6. A Worst Practices Guide to Insider Threats --
Index
title_new Insider Threats /
title_sort insider threats /
series Cornell Studies in Security Affairs
series2 Cornell Studies in Security Affairs
publisher Cornell University Press,
publishDate 2017
physical 1 online resource (216 p.) : 1 halftone, 3 tables, 6 charts
Issued also in print.
contents Frontmatter --
Contents --
Contributors --
Acknowledgments --
Introduction: Inside the Insider Threat --
1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities --
2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies --
3. Lessons from the Anthrax Letters --
4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan --
5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries --
6. A Worst Practices Guide to Insider Threats --
Index
isbn 9781501705946
9783110665871
9781501705175
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6432
callnumber-sort HV 46432
geographic_facet United States
url https://doi.org/10.7591/9781501705946
https://www.degruyter.com/isbn/9781501705946
https://www.degruyter.com/document/cover/isbn/9781501705946/original
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 650 - Management & public relations
dewey-ones 658 - General management
dewey-full 658.4/73
dewey-sort 3658.4 273
dewey-raw 658.4/73
dewey-search 658.4/73
doi_str_mv 10.7591/9781501705946
oclc_num 967938743
work_keys_str_mv AT bunnmatthew insiderthreats
AT dæhliandreashoelstad insiderthreats
AT glynnkathrynm insiderthreats
AT hegghammerthomas insiderthreats
AT longaustin insiderthreats
AT saganscottd insiderthreats
AT schoutenronald insiderthreats
AT sternjessica insiderthreats
AT zegartamyb insiderthreats
status_str n
ids_txt_mv (DE-B1597)481728
(OCoLC)967938743
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017
is_hierarchy_title Insider Threats /
container_title Title is part of eBook package: De Gruyter Cornell University Press Complete eBook-Package 2017
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1770177060373790720
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06147nam a22009135i 4500</leader><controlfield tag="001">9781501705946</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220302035458.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220302t20172017nyu fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979968916</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501705946</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7591/9781501705946</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)481728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967938743</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6432</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/73</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Insider Threats /</subfield><subfield code="c">ed. by Matthew Bunn, Scott D. Sagan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ithaca, NY : </subfield><subfield code="b">Cornell University Press, </subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (216 p.) :</subfield><subfield code="b">1 halftone, 3 tables, 6 charts</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cornell Studies in Security Affairs</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Contributors -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction: Inside the Insider Threat -- </subfield><subfield code="t">1. Insiders and Outsiders: A Survey of Terrorist Threats to Nuclear Facilities -- </subfield><subfield code="t">2. The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies -- </subfield><subfield code="t">3. Lessons from the Anthrax Letters -- </subfield><subfield code="t">4. Green-on-Blue Violence: A First Look at Lessons from the Insider Threat in Afghanistan -- </subfield><subfield code="t">5. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries -- </subfield><subfield code="t">6. A Worst Practices Guide to Insider Threats -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">High-security organizations around the world face devastating threats from insiders-trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.Insider threats pose dangers to anyone who handles information that is secret or proprietary, material that is highly valuable or hazardous, people who must be protected, or facilities that might be sabotaged. This is the first book to offer in-depth case studies across a range of industries and contexts, allowing entities such as nuclear facilities and casinos to learn from each other. It also offers an unprecedented analysis of terrorist thinking about using insiders to get fissile material or sabotage nuclear facilities.ContributorsMatthew Bunn, Harvard UniversityAndreas Hoelstad Dæhli, OsloKathryn M. Glynn, IBM Global Business Services Thomas Hegghammer, Norwegian Defence Research Establishment, OsloAustin Long, Columbia UniversityScott D. Sagan, Stanford UniversityRonald Schouten, Massachusetts General Hospital and Harvard Medical School Jessica Stern, Harvard UniversityAmy B. Zegart, Stanford University</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Nuclear terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Nuclear terrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism--Prevention--United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Political Science &amp; Political History.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National &amp; International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bunn, Matthew, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bunn, Matthew, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dæhli, Andreas Hoelstad, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Glynn, Kathryn M., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hegghammer, Thomas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Austin, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagan, Scott D., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagan, Scott D., </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schouten, Ronald, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stern, Jessica, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zegart, Amy B., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Cornell University Press Complete eBook-Package 2017</subfield><subfield code="z">9783110665871</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501705175</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.7591/9781501705946</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781501705946</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781501705946/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-066587-1 Cornell University Press Complete eBook-Package 2017</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>