Loading...
Please wait, while we are loading the content...
Similar Documents
Insider Threats to Information Systems
| Content Provider | Semantic Scholar |
|---|---|
| Author | Griffin, James S. Grimaila, Michael R. |
| Copyright Year | 2008 |
| Abstract | There are few, if any, organizations immune to the adverse and costly effects of successful information system attacks. As reliance on information systems continues to increase, organizations must continue to implement effective computer security measures to maintain their operability. This paper focuses on internal attacks executed by those individuals within the organization who have authorized access to information systems and behave in an unethical manner. We examine categorization of insiders; the motives and psychological profiles behind their destructive behavior; and conclude with a discussion of several measures that organizations can implement in order to detect and defend against insider threats. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1025&context=sais2008&httpsredir=1&referer= |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |