“…For instance, a naive employee, ignoring company security policies becomes an internal threat [13], if installing an unauthorised application in his mobile device introduces malware that was not specifically targeting the organisation, but may create the perfect opportunity for an undetected and unknown outsider to access corporate information assets [22] [25]. Meanwhile, databases may be tampered with by a reckless highly-trusted employee who is trying to deceive the organisation [26] by misusing his access credentials [27]. Hence, although these illegal actions may be investigated if proper auditing is enabled, in the BYOD context, it is more difficult to audit and control trusted insiders' actions [12] because digital investigations might be challenged by the following internal threat contexts.…”