Author:
Ho Shuyuan Mary,Oliveira Diogo,Rathi Raghav
Publisher
Springer International Publishing
Reference40 articles.
1. Verizon 2018 Data breach investigations report. Verizon (2018).
http://www.documentwereld.nl/files/2018/Verizon-DBIR_2018-Main_report.pdf
. Accessed 5 Nov 2018
2. Willison, R., Warkentin, M.: Beyond deterrence: an expanded view of employee computer abuse. MIS Q. 37(1), 1–20 (2013)
3. Ho, S.M., Hancock, J.T., Booth, C.: Ethical dilemma: deception dynamics in computer-medicated group communication. J. Am. Soc. Inf. Sci. Technol. 68(12), 2729–2742 (2017)
4. Ho, S.M., et al.: Demystifying insider threat: language-action cues in group dynamics. In: Hawaii International Conference on System Sciences (HICSS-49). IEEE, Kauai (2016)
5. Ho, S.M., Kaarst-Brown, M., Benbasat, I.: Trustworthiness attribution: inquiry into insider threat detection. J. Assoc. Inf. Sci. Technol. 69(2), 271–280 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献