The insider threat to information systems and the effectiveness of ISO17799
- 20 June 2005
- journal article
- Published by Elsevier BV in Computers & Security
- Vol. 24 (6), 472-484
- https://doi.org/10.1016/j.cose.2005.05.002
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- An integrative model of computer abuse based on social control and general deterrence theoriesInformation & Management, 2004
- Improving user security behaviourComputers & Security, 2003
- The law, cybercrime, risk assessment and cyber protectionComputers & Security, 2003
- Information security policy — what do international information security standards say?Computers & Security, 2002
- A holistic model of computer abuse within organizationsInformation Management & Computer Security, 2002
- Perceived Behavioral Control, Self‐Efficacy, Locus of Control, and the Theory of Planned Behavior1Journal of Applied Social Psychology, 2002
- Computer crimes: theorizing about the enemy withinComputers & Security, 2001
- Testing the Leading Crime Theories: An Alternative Strategy Focusing on Motivational ProcessesJournal of Research in Crime and Delinquency, 1995
- Acts against the workplace: Social bonding and employee devianceDeviant Behavior, 1986
- “SITUATIONAL” CRIME PREVENTION: THEORY AND PRACTICEThe British Journal of Criminology, 1980