Identifying and Mitigating Insider Threats

Christian W. Probst. Identifying and Mitigating Insider Threats. it - Information Technology, 53(4):202-206, 2011. [doi]

Abstract

Abstract is missing.