Categorizing Cyberspace Insider Threat Activity
Muma Business Review
• Volume 9
• 2025
• pp. 123-129
This qualitative research provides insights to help executives, managers, and information security
professionals better understand insider threat activities by providing a sensible classification system.
Using interview data from cybersecurity subject matter experts, a novel construct was developed that
demystifies employee infraction intentions by introducing categorizations of unwitting, witting,
unmalicious, and malicious.
professionals better understand insider threat activities by providing a sensible classification system.
Using interview data from cybersecurity subject matter experts, a novel construct was developed that
demystifies employee infraction intentions by introducing categorizations of unwitting, witting,
unmalicious, and malicious.
Information Security, Cybersecurity, Insider Threats, Cyberspace, Information Systems, Human Factors
2 total downloads


Back