|
Volumn 20, Issue 8, 2001, Pages 715-723
|
Computer crimes: Theorizing about the enemy within
|
Author keywords
Computer crime; Information security; Malicious act; Violation of safeguards
|
Indexed keywords
COST EFFECTIVENESS;
DATA PRIVACY;
LAWS AND LEGISLATION;
RISK MANAGEMENT;
SECURITY OF DATA;
DATA PROTECTION LEGISLATION;
COMPUTER CRIME;
|
EID: 0035658603
PISSN: 01674048
EISSN: None
Source Type: Journal
DOI: 10.1016/S0167-4048(01)00813-6 Document Type: Note |
Times cited : (93)
|
References (11)
|