This paper examines three scenarios of insider fraud based on empirical data from an upper-tier budget hotel in London, as part of a thought experiment on insider fraud. The scenarios are presented in the form of crime scripts and are reviewed under the theoretical framework of the Routine Activity Approach, which is widely used in crime science. The discussion that follows reflects on the theoretical underpinnings of the Routine Activity Approach and raises wider issues and concerns relating to information security, such as the adoption and implementation of controls against the insider threat
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the co...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
This is the first systematic review of fraud in the hospitality sector to provide a holistic view of...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
Insiders can engage in malicious activities against organizations such as data theft and sabotage. P...
Espionage perpetrated by insiders using information technology (IT) assets continues to vex organiza...
Prior information security studies have largely focused on understanding employee security behavior ...
This study is the first to provide a holistic view of an understudied topic, insider fraud in UK pol...
Online fraud is the most prevalent acquisitive crime in Europe. This study applies routine activitie...
Malicious insiders account for large proportion of security breaches or other kinds of loss for orga...
Insider attacks are able to evade traditional security controls because the perpetrators of the atta...
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the co...
This paper sets out 99 case studies of insider attacks that took place in the UK. The study involved...
This paper looks at a number of issues relating to the malicious insider and the nature of motivatio...
This is the first systematic review of fraud in the hospitality sector to provide a holistic view of...
The purpose of this research is to identify the factors that influence organizational insiders to vi...
Insiders can engage in malicious activities against organizations such as data theft and sabotage. P...
Espionage perpetrated by insiders using information technology (IT) assets continues to vex organiza...
Prior information security studies have largely focused on understanding employee security behavior ...
This study is the first to provide a holistic view of an understudied topic, insider fraud in UK pol...
Online fraud is the most prevalent acquisitive crime in Europe. This study applies routine activitie...
Malicious insiders account for large proportion of security breaches or other kinds of loss for orga...
Insider attacks are able to evade traditional security controls because the perpetrators of the atta...
Current and former employees, contractors, and other organizational "insiders" pose a substantial th...
The advent of IT has created unprecedented opportunities for the occurrence of computer crime like f...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...