[1]
S. Furnell and A. H. Phyo, “Considering the Problem of Insider IT Misuse”, AJIS, vol. 10, no. 2, May 2003.