[1]
Furnell, S. and Phyo, A.H. 2003. Considering the Problem of Insider IT Misuse. Australasian Journal of Information Systems. 10, 2 (May 2003). DOI:https://doi.org/10.3127/ajis.v10i2.160.