A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
Communications of the ACM
Digital Object Identifier (DOI)
Whitman, Michael E. "Enemy at the Gate: Threats to Information Security." Communications of the ACM 46.8 (2003): 91-95.