Abstract
Insider cyber maliciousness presents a significant challenge to organizational security. Existing research has focused on identifying determinants of malicious cyber behavior but has not accounted for the progression insiders go through in arriving at the point where they look to harm their employers. This knowledge gap prevents organizations from potentially derailing acts of cyber maliciousness through timely interventions. Based on interviews with a cross-industry sample of organizational insiders, this study adopts a stage theory development approach to explore the progression of insiders from cyber benign to cyber malicious. Stage theories are useful frameworks that help explain how individuals’ perceptions, emotions, and/or behaviors progress through distinct and qualitatively different stages of development. By uncovering the initial, subsequent, and recurring perceptions and emotions that drive insiders to engage in malicious cyber activities, this research contributes to a deeper understanding of the phenomenon. Our findings establish a new basis for understanding insider cyber maliciousness, presenting it as an evolutionary progression. As such, our findings also reorient the focus of malicious insider interventions toward strain-reducing or strain-relieving interventions based on the initial, subsequent, or recurring strain experiences.
| Original language | English |
|---|---|
| Pages (from-to) | 739-757 |
| Number of pages | 19 |
| Journal | European Journal of Information Systems |
| Volume | 34 |
| Issue number | 4 |
| DOIs | |
| State | Published - 2025 |
Keywords
- Strain
- cyber
- evolution
- maliciousness
- security
- stage theory
Fingerprint
Dive into the research topics of 'From cyber benign to cyber malicious: unveiling the evolution of insider cyber maliciousness from a stage theory perspective'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver