Showing 1 - 4 of 4 results for the Author - school of information systems management , Type - White Paper
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
This paper discusses the preliminary system dynamic maps of the insider cyber-threat and describes the main ideas behind the research proposal.
In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.