A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Review of IS Security Policy Compliance
2017
ACM SIGMIS Database the DATABASE for Advances in Information Systems
An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent and malicious insiders. We begin by defining the terms, developing a new taxonomy of insiders, and then providing a comprehensive review of articles on IS
doi:10.1145/3130515.3130518
fatcat:tg4gndbapnhyjglugzwsrkyemm