Ransbotham, Samuel B. - 2008
fundamentally different paths to information security compromise an opportunistic path and a deliberate path. Through a grounded … approach using interviews, observations, and secondary data, I advance a model of the information security compromise process … converge and escalate. Beyond the specific findings in the Internet security context, the study leads to a richer understanding …