Browsing Business Information Systems by Subject "Insider Abuse"
Now showing items 1-1 of 1
-
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)A deficiency exists in the Information Systems Security literature because of the paucity of research aimed at understanding the mind of the insider criminal . Much of the academic and popular press focuses on external ...