z-logo
open-access-imgOpen Access
Workarounds as Means to Identify Insider Threats to Information Systems Security
Author(s) -
PierreEmmanuel Arduin,
Dragos Vieru
Publication year - 2017
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
Subject(s) - workaround , insider , insider threat , computer security , information security , identification (biology) , computer science , information systems security , business , information system , risk analysis (engineering) , management information systems , political science , law , programming language , botany , biology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here