Malicious Insiders: Who Might Be the Ephialtes in Your Organization?
Cover - CISSE Volume 4, Issue 1
PDF

Keywords

Malicious Insiders
Text Mining
Cyber Security
Characteristics

How to Cite

Malicious Insiders: Who Might Be the Ephialtes in Your Organization?. (2016). Journal of The Colloquium for Information Systems Security Education, 4(1), 18. https://journal.cisse.info/jcisse/article/view/53

Abstract

Malicious insiders continue to post great threats to organizations. With their knowledge about organization and access to organizational resources, malicious insiders could bypass security countermeasures easily and result in devastating consequences. In this study we compare 30 malicious insiders with 30 benign insiders with respect to the personality and other psychometrics. We found that avoidant personality, antisocial personality and disruptive mood differentiate malicious insiders with the benign ones. Also, if an insider is both narcissistic and disgruntled, he/she tends to launch the malicious attack. The implication for this research has two aspects: first, we validated the characteristics of malicious insiders proposed by previous research, second, the findings suggest that organizations should be more sensitive to employees who exhibit certain behavioral precursors.

PDF

Open Access License Notice:

This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.