Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Discovering the Impact: Exploring How Insider Threat Drivers Relate to Organizational Performance

Sedek M, Omar S.R, Isnin S.N

http://dx.doi.org/10.6007/IJARBSS/v15-i3/24976

Open access

This study aims to investigate the determinants of Insider Threat Drivers and the impact on organizational performance. By understanding these determinants, organizations can generate awareness to protect themselves and mitigate potential insider threats by recognizing their characteristics. The findings reveal a significant relationship between individual personality traits, motivation to attack, psychological state, skill set, opportunity, and individual characteristics with the propensity for insider threats and concern for precipitating events. Additionally, the study shows a significant relationship between insider threat drivers and organizational performance. This research is crucial as it provides guidelines, instructions, and awareness to support organizations, employers, and researchers in mitigating potential insider threats. By understanding the underlying factors that contribute to insider threats, organizations can implement targeted strategies to enhance security and protect their assets.

Clark, J. W. (2016). Threat from within: Case studies of insiders who committed information technology sabotage. Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016, 414–422. https://doi.org/10.1109/ARES.2016.78
Cline, H. G. (2016). Understanding the insider threat.
Colwill, C. (2010). Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report, 14(4), 186–196. https://doi.org/10.1016/j.istr.2010.04.004
Costa, D. (2017, March 7). CERT definition of 'insider threat' - Updated. [Blog post]. Retrieved from http://insights.sei.cmu.edu/blog/cert-definition-of-insider-threat-updated/
Cummings, A., Lewellen, T., McIntire, D., Moore, A. P., & Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial services sector. Carnegie Mellon University, Software Engineering Institute, CERT Division.
DOSM. (2020). Department of Statistics Malaysia Press Release: Index of Industrial Production, Malaysia.
Ford, J. L., & Backhoff, E. G. (2019). From data to decision: A plan for mitigating insider threats. Journal of Information Warfare, 18(1), 53-63.
Jones, A., & Ashenden, D. (2005). Risk management for computer security. Butterworth-Heinemann.
Liang, N. P. (2016). Characteristics of malicious insiders and their relationships with different threats.
Maasberg, M., Warren, J., & Beebe, N. L. (2015). The dark side of the insider: Detecting the insider threat through examination of dark triad personality traits. Proceedings of the Annual Hawaii International Conference on System Sciences, 2015-March, 3518–3526. https://doi.org/10.1109/HICSS.2015.423
Martinko, M. J., Gundlach, M. J., & Douglas, S. C. (2002). Toward an integrative theory of counterproductive workplace behavior: A causal reasoning perspective. International Journal of Selection and Assessment, 10(1-2), 36–50.
Neely, A. D., Adams, C., & Kennerley, M. (2002). The performance prism: The scorecard for measuring and managing business success. Prentice Hall Financial Times.
Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R. T., & Whitty, M. (2014). Understanding insider threat: A framework for characterizing attacks. Proceedings of the IEEE Symposium on Security and Privacy, 214–228. https://doi.org/10.1109/SPW.2014.38
Ponemon Institute. (2018). The 2018 insider threat report. Retrieved from https://www.observeit.com/2018-insider-threat-report/
Sedek, M., & Mohd, C. K. N. C. K. (2025). Exploring Educators’ Perception of and Readiness for Hybrid Flexible Learning in Technical and Vocational Education and Training (TVET) in Higher Education. Scientific Journal of King Faisal University: Humanities and Management Sciences.
Schulze, H. (2018). Insider Threat 2018 Report. Retrieved from https://www.readkong.com/page/insider-threat-2018-report-4204677
Verizon. (2020). Breach investigations report. Retrieved from https://www.wired.com/images_blogs/threatlevel/2010/07/2010-Verizon-Data-Breach-Investigations-Report.pdf

M, S., Omar, S. ., & Isnin, S. . (2025). Discovering the Impact: Exploring How Insider Threat Drivers Relate to Organizational Performance. International Journal of Academic Research in Business and Social Sciences, 15(3), 714–729.