(1)
Furnell, S.; Phyo, A. H. Considering the Problem of Insider IT Misuse. AJIS 2003, 10.