13.2 Why Is This Happening? Who Is Doing It? And What’s Their Motivation?
13.3 Where Are Vulnerabilities? Understanding the Weaknesses
13.4 Taking Action
This is a derivative of Information Systems: A Manager's Guide to Harnessing Technology by a publisher who has requested that they and the original author not receive attribution, originally released and is used under CC BY-NC-SA. This work, unless otherwise expressly stated, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.