Now showing items 1-3 of 3

    • The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent" 

      Browne, Sean; Lang, Michael; Golden, William (AIS Electronic Library (AISeL), 2015-05-29)
      A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ...
    • Linking threat avoidance and security adoption: a theoretical model For SMEs 

      Browne, Sean; Lang, Michael; Golden, Willie (AIS Electronic Library (AISeL), 2015-06-07)
      A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...
    • Open social data crime analytics 

      Ihsan, Ullah,; Lane, Caoilfhionn; Drury, Brett; Mellotte, Marc; Madden, Michael G. (IJCAI 17 Melbourne, 2017-07-20)
      Crime is under-reported. Reporting crime requires the victim to complete a number of administrative obligations. These obligations, as well as the nature of the crime, may create an inertia that discourages the reporting ...