Three Essays on Managing Information Security Using the Fraud Triangle