A holistic model of computer abuse within organizations.
Jintae LeeYounghwa LeePublished in: Inf. Manag. Comput. Secur. (2002)
Keyphrases
- mathematical model
- probabilistic model
- formal model
- information systems
- probability distribution
- computational model
- theoretical analysis
- management system
- database
- information technology
- data sets
- database systems
- high level
- information retrieval
- data mining
- process model
- databases
- statistical model
- sensitivity analysis
- bayesian framework