Publisher
Springer Science and Business Media LLC
Subject
General Psychology,Applied Psychology,General Business, Management and Accounting,Business and International Management
Reference170 articles.
1. Alahmadi, B., Legg, P. and Nurse, J. (2015). Using internet activity profiling for insider-threat detection. In Proceedings of the 17th International Conference on Enterprise Information Systems.
2. Allport, G.W. (1937). The nature of traits. In G.W. Allport (Ed.), Personality: A psychological interpretation (pp. 312-342). Henry Holt and Company.
3. Andon, P., Free, C., & Scard, B. (2015). Pathways to accountant fraud: Australian evidence and analysis. Accounting Research Journal, 28, 10–44.
4. Antonakis, J., Bendahan, S., Jacquart, P., & Lalive, R. (2010). On making causal claims: A review and recommendations. Leadership Quarterly, 21, 1086–1120.
5. Axelrad, E.T., Sticha, P.J., Brdiczka, O., & Shen, J. (2013). A Bayesian network model for predicting insider threats. In 2013 IEEE Security and Privacy Workshops.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献