Information assets of enterprises are vulnerable to theft and need to be protected to avoid information leakage to unauthorized parties. Technical countermeasures to protect confidential information fall to short, as information leaks can emerge from non-malicious behavior of users while they execute a business process in an Enterprise System. Our study investigates characteristics of security incidents in which users are authorized to access information in a secure domain, but cause information flow into an unsecure domain without any malicious objectives. We use a qualitative research method to explore the context, activities, and behaviors that lead to leakage of confidential information. We will collect empirical data in three sequentia...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Sensitive company information can leak to unauthorized parties in case employees do not perform effe...
Sensitive company information can leak to unauthorized parties in case employees do not perform effe...
Structured Abstract Purpose-The purpose of this paper is to explore the human factors triggering inf...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and need to be protected to avoid informat...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Information assets of enterprises are vulnerable to theft and require protection to avoid informatio...
Sensitive company information can leak to unauthorized parties in case employees do not perform effe...
Sensitive company information can leak to unauthorized parties in case employees do not perform effe...
Structured Abstract Purpose-The purpose of this paper is to explore the human factors triggering inf...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
It is not uncommon these days to come across security incidents involving sensitive data. Most resea...
Driven by the difficulty in achieving complete security with technical tools, business investigators...
The growing number of information security breaches in organisations presents a serious risk to the ...