Cargando…

Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks

The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend this work by specifically examini...

Descripción completa

Detalles Bibliográficos
Autores principales: Khan, Neeshe, J. Houghton, Robert, Sharples, Sarah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer London 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8550909/
https://www.ncbi.nlm.nih.gov/pubmed/34725543
http://dx.doi.org/10.1007/s10111-021-00690-z