Browsing Business Information Systems (Conference Papers) by Subject "Computer Abuse"
Now showing items 1-1 of 1
-
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ...