Login / Signup
Volitional Non-Malicious Insider Threats: At The Intersection of COVID-19, WFH and Cloud-Facilitated Shadow-Apps.
Patricia Akello
Published in:
AMCIS (2021)
Keyphrases
</>
insider threat
insider attacks
email
cloud computing
security architecture
shadow detection
data streams
light source
critical infrastructure
malicious attacks
mobile applications
access control
cast shadows
shadow removal