Browsing: which are attempts to rationalize the damage they may be causing. The notion was developed by criminologists in the 1950s to explain how offenders overcome their guilt. For instance

     A chain is only as strong as its weakest link. It is up to managers and supervisors to take responsibility for enforcing security protocols. When internet use became widespread in the late 1980s, a set of commonsense security rules were developed. The same principles still apply; however, today’s technologies are more sophisticated.