Workarounds represent deliberate actions of employees in contrast with the prescribed practices and organizations generally perceive them as unwanted processes. Workarounds may lead to information systems (IS) security policy violations, notably when prescribed practices lead employees to face obstacles in accomplishing their daily tasks. Such behavior generates new insider threats to IS security. In this article, we adopt the view that workarounds may enable the identification of new security threats. We propose a conceptual model that illustrates how workarounds generating non-malicious security violations might constitute sources of knowledge about new security threats
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
The growing number of information security breaches in organisations presents a serious risk to the ...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
An understanding of insider threats in information systems (IS) is important to help address one of ...
There are few, if any, organizations immune to the adverse and costly effects of successful informat...
Purpose - The purpose of this paper is to provide an analysis of the studies about workaround behavi...
Abstract—An enterprise’s information security policy is an exceptionally important control as it pro...
Malicious insiders present a serious threat to information systems due to privilege of access, knowl...
Although mentioned frequently in the organization, management, public administration, and technology...
Over the past decade, several studies, industry reports and surveys have revealed that insider threa...
Insiders within organizations increase the risk of security incidents through non-malicious intentio...
Malicious insiders present a serious threat to information systems due to privilege of access, knowl...
This paper will examine the difference between management’s perception of the information security r...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
The growing number of information security breaches in organisations presents a serious risk to the ...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
Workarounds represent deliberate actions of employees in contrast with the prescribed practices and ...
An understanding of insider threats in information systems (IS) is important to help address one of ...
There are few, if any, organizations immune to the adverse and costly effects of successful informat...
Purpose - The purpose of this paper is to provide an analysis of the studies about workaround behavi...
Abstract—An enterprise’s information security policy is an exceptionally important control as it pro...
Malicious insiders present a serious threat to information systems due to privilege of access, knowl...
Although mentioned frequently in the organization, management, public administration, and technology...
Over the past decade, several studies, industry reports and surveys have revealed that insider threa...
Insiders within organizations increase the risk of security incidents through non-malicious intentio...
Malicious insiders present a serious threat to information systems due to privilege of access, knowl...
This paper will examine the difference between management’s perception of the information security r...
Threats from the inside of an organization’s perimeters are a significant problem, since it is diffi...
The growing number of information security breaches in organisations presents a serious risk to the ...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...