共 35 条
[1]
Pereira T.(2015)Insider threats: The major challenge to security risk management, Lect. Notes Comput. Sci. 9190 654-663
[2]
Santos H.(2013)Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors MIS Q. 37 1189-1210
[3]
Posey C.(2014)Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders Inf. Manage. 51 551-567
[4]
Roberts T.L.(2002)A framework for understanding and predicting insider attacks Comput. Secur. 21 526-531
[5]
Lowry P.B.(2009)Detecting insider theft of trade secrets IEEE Secur. Priv. 7 14-21
[6]
Bennett R.J.(2005)The insider threat to information systems and the effectiveness of ISO17799 Comput. Secur. 24 472-484
[7]
Courtney J.(2009)Building a system for insider security IEEE Secur. Priv. 7 30-38
[8]
Posey C.(2017)Translating employee engagement research into practice Organ. Dyn. 46 76-86
[9]
Roberts T.L.(2016)The ontological status of trust in information security Sci. Tech. Inf. Process. 43 58-65
[10]
Lowry P.B.(2017)Raising awareness: People are your last line of defence Comput. Fraud Secur. 2017 10-14