Search
Now showing items 1-4 of 4
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)
A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...
Contextualising the insider threat: a mixed method study
(AIS Electronic Library (AISeL), 2016-12-10)
The insider threat is potentially the most damaging and costly threat to organisations, and
while there is a considerable body of literature aimed at understanding this phenomenon, we
contend that the theories contained ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Cloud security consciousness: a need for realisation in entrepreneurial small firms
(AIS Electronic Library (AISeL), 2014-04-09)
Cloud computing represents a fundamental shift in the way information services are
provided but with its unique architecture comes additional security challenges, many of
which are technical in nature. However, the ...