• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 2

April 29, 2025 by Kelly McKain-D'Andria 27 Comments

What factors contribute to making an employee an information security threat actor?

Filed Under: 2b: Creating a Security Aware Organization Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 10, 2025 at 11:18 pm

    1. Uninformed Actions Lead to Vulnerabilities
    • Poor Security Practices:
    ◦ 21% let family/friends use work devices (McAfee, 2005).
    ◦ 51% connect personal devices to work systems, risking malware infections.
    ◦ Weak passwords, unsecured desktops (e.g., no screen locks), and mishandling sensitive data are common issues.
    • Susceptibility to Attacks:
    ◦ Employees may fall for phishing emails, download malware, or forward hoaxes, wasting resources.
    ◦ Lack of awareness about wireless network risks or file-sharing dangers (e.g., pirated software spreading malware).
    2. Insider Threats (Malicious or Negligent)
    • Non-Malicious Risks: Ignorance of policies (e.g., sharing passwords, skipping updates) creates exploitable gaps.
    • Malicious Risks: Disgruntled employees or corporate spies with system access can intentionally breach data.

    Log in to Reply
  2. Jialin Fan says

    June 15, 2025 at 3:35 am

    Several factors could contribute to an employee becoming an information security threat actor. Firstly, financial motives play a significant role. Employees facing financial difficulties may be tempted to sell sensitive company information for personal gain. Secondly, dissatisfaction at work can lead to malicious behavior. If an employee feels undervalued, underpaid, or has conflicts with colleagues or management, they might seek revenge by compromising information security. Thirdly, lack of awareness and training is also a crucial factor. Employees who are not well – informed about information security policies and best practices may inadvertently or deliberately violate security protocols.

    Log in to Reply
  3. Xinran Wu says

    June 16, 2025 at 1:32 am

    There are many factors that lead employees to become participants in information security threats, For example, employees inadvertently visiting infected malware, responding to phishing emails, storing login information in an insecure location, connecting to an insecure wi-fi, having a computer with a poor firewall policy, or even leaking sensitive information over the phone at work.

    Log in to Reply
  4. Yingyu Wang says

    June 16, 2025 at 4:13 am

    The driving factors that can turn employees into threats to information security include the following:
    Internal malice from former employees or those driven by financial incentives.
    External inducement pressure caused by attackers using psychological manipulation to break down employees’ mental defenses.
    Behavioral flaws due to technical knowledge gaps, such as employees automatically connecting to unsecured wireless networks or using untrusted USB devices.
    Institutional execution gaps, such as the lack of physical access controls like entry systems or weak enforcement of password policies.

    Log in to Reply
  5. Jingni Li says

    June 17, 2025 at 2:13 am

    1.Awareness/training gaps: Uninformed staff fall for phishing or mishandle data.
    2.Poor practices: Weak passwords, risky device/network use create openings.
    3.Malicious intent: Grudges, greed, or ideology drive data theft/sabotage.
    4.Social engineering: Trust in fake requests (e.g., phony CEO emails) lets attackers in.
    5.Overly broad access: Excess data access (if misused/tricked) causes harm.

    In short, a mix of human error, bad habits, malice, and flawed policies/tech turns employees into threats.

    Log in to Reply
  6. Ruizhen Zhang says

    June 17, 2025 at 2:52 am

    First, due to the employee’s own factors, such as lack of awareness and poor safety practices. Because employees may not fully understand the importance of information security or fail to comply with organizational policies due to carelessness. Secondly, in terms of organizational factors, such as insufficient training and immature safety culture. This is a deficiency in the organization’s management and education of its employees, which can indirectly lead to employees becoming threat actors. Finally, external factors, such as social engineering attacks and threats, may expose employees to external pressures or temptations

    Log in to Reply
  7. Siyu Li says

    June 17, 2025 at 3:33 am

    Employees can become information security threat actors due to a combination of individual, organizational, and environmental factors.
    In terms of individual motivations and behaviors, it is devided into intentional malicious actions, including financial gain, revenge or discontent, espionage or insider threats, and unintentional ngligence such as lack of security awareness, careless data handling, burnout or overwork.
    In terms of organizational vulnerabilities, there are three factors existing mainly, which are inadequate security policies (loose access controls, week password policies), insufficient training and education (lack of cybersecurity training, no clear reportingg channels) and poor workplace culture (high turnover or low morale, blurred ethical boundaries).
    In terms of technology and environment, it is mainly caused by two types of factors—-systems and process flaws such as outdated technology and lacke of monitoring and auditing, and external pressures and exploitation, especially hackers attacks and third-party risks.

    Log in to Reply
  8. Yufei Zhu says

    June 17, 2025 at 4:01 am

    There are a number of factors that can cause an employee to become an information security threat. First, if employees lack security awareness or training, they may inadvertently harm an organization’s information system. For example, posting sticky notes with important account passwords randomly next to the computer, which can lead to account theft. Secondly, the abuse of privileges is also one of the reasons. If an internal employee of an organization has too much authority, there is a high risk that data will be leaked from the insider. Employees are also likely to be attacked by phishing and scams, which can be a breach in corporate information security.

    Log in to Reply
  9. Jiaxuan Ma says

    June 17, 2025 at 6:15 am

    The factors can be divided into unintentional and intentional reasons.

    Unintentional reasons:
    Letting family and friends use company PCs;
    Connecting personal gadgets to work PC;
    Downloading unauthorized content;
    Lack of IT security knowledge.

    intentional reasons:
    Obtaining economic benefits;
    Retaliating against the company due to dissatisfaction.

    Log in to Reply
  10. Meiyan Liu says

    June 17, 2025 at 9:40 am

    At the employee level, multiple security vulnerabilities exist. On the one hand, employees generally lack security awareness and training, making them unable to identify and address threats such as phishing, malware, and social engineering. On the other hand, due to carelessness or insufficient knowledge of best practices, even well-intentioned employees may violate security policies. Meanwhile, behaviors like complacency and disregard for security protocols also create loopholes. At the organizational level, if leadership does not attach sufficient importance to security work and fails to foster a security-centric cultural atmosphere, these risky behaviors will be further exacerbated.

    Log in to Reply
  11. Wenhao Liu says

    June 18, 2025 at 7:25 am

    1. Lack of Training: Inadequate security awareness training leaves employees unaware of risks like phishing or malware, making them more likely to act carelessly.
    2. Policy Non-Compliance: Ignoring security policies, such as using personal devices on corporate networks or storing data insecurely, increases vulnerability.
    3. Social Engineering Vulnerability: Employees may fall for scams (e.g., fake emails pretending to be from IT), especially if not educated on how to identify them.
    4. Disgruntled employees or those bribed by attackers might deliberately steal data or sabotage systems.
    5. Human Error: Simple mistakes, like misconfiguring settings or sending sensitive emails to the wrong person, can have severe consequences.

    Log in to Reply
  12. Yiwen Lou says

    June 18, 2025 at 8:44 am

    There are a few key reasons an employee might pose a risk. First off, money matters a lot. If someone’s struggling financially, they might be tempted to sell sensitive company data for cash—kinda like selling test answers for personal gain.
    Second, being unhappy at work can lead to messed-up behavior. If an employee feels underappreciated, underpaid, or has beef with coworkers/management, they might try to get back at the company by sabotaging security. It’s like throwing a tantrum, but with cyber consequences.
    Third, not knowing better is a huge factor. If employees don’t get proper training on security policies, they might accidentally (or on purpose) break rules. Maybe they share passwords without thinking, or click a sketchy link because they didn’t know it was bad. It’s like not studying for a test and flunking because you didn’t know the material.

    Log in to Reply
  13. Xintong Zhang says

    June 18, 2025 at 9:46 am

    Employees become information security threat actors due to multiple factors. First, insufficient security education, training and awareness (SETA) leaves employees unable to identify and mitigate risks, such as falling victim to phishing attacks, clicking malicious links or sharing credentials. Non-compliance with security policies and procedures, including using weak passwords, mishandling data or connecting unauthorized devices, amplifies vulnerabilities. Social engineering tactics take advantage of employees’ lack of vigilance, tricking them into disclosing sensitive information or granting unauthorized access. Unclear role definitions and accountability in security organizational structures lead to ambiguous responsibilities, while neglecting to follow basic security protocols, such as failing to lock workstations or update systems, further endangers security. Additionally, ignorance of regulatory requirements and the consequences of security breaches, combined with a lack of continuous training, perpetuates risky behaviors, causing employees to unknowingly become threats to organizational information security.

    Log in to Reply
  14. Meiqi Yan says

    June 18, 2025 at 10:48 am

    There are many reasons why employees can pose a threat to information security. These include both personal factors and issues related to company management. The most common scenario is that employees make mistakes carelessly, such as clicking on fraudulent emails, setting simple passwords, or infecting files with viruses when using USB drives. Sometimes employees are dissatisfied with the company and may deliberately leak data to cause damage. If the company does not prioritize security, for example, by allowing employees to bypass security checks for convenience, it will also create hidden dangers. There is also the issue that IT personnel are too busy and may overlook security warnings. The most serious case is insider theft, such as someone secretly selling company data for profit. In the end, the employees themselves are not the problem. The issue lies in whether the company has conducted adequate security training, established simple and effective rules, and created a trusting working environment.

    Log in to Reply
  15. Liyuan Zhou says

    June 18, 2025 at 11:36 am

    Employees become information security threats mainly due to insufficient security awareness, such as not understanding the risks of connecting to public WiFi or using weak passwords, making them prone to being deceived by phishing emails. Inadequate corporate management, such as failing to establish clear security rules, provide training, or granting excessive account permissions, also exposes data to risks. Some employees may intentionally sell data or delete files out of greed or revenge for dismissal, or violate regulations to transmit confidential information for convenience. Additionally, hackers often impersonate others to trick employees, using them as a breakthrough to steal data. These combined factors easily turn employees into information security threats.

    Log in to Reply
  16. Yiying Chen says

    June 18, 2025 at 12:50 pm

    Firstly, unintentional mistakes like weak passwords, which may enable brute-force attacks, or the password reuse means a breach in one system can compromise all linked accounts. Secondly, intentional insider threats such as data theft or system sabotage. Employees might always be the prime targets for pnishing emails, phone scams, and so on, giving cybercriminals chances to penetrate. Thirdly, employees often use personal USB drives, cloud storage, or unapproved devices to transfer data, but these actions can introduce malware or leak sensitive information if devices are lost or stolen. Last, inadequate security awareness due to insufficient training. Although there are techonological preventions in devices or systems, however, if employees do not know how to identify a phishing attempt, the simple click is probable to cause big loss such as ‘Target’s case’.

    Log in to Reply
  17. Zuqi Zhang says

    June 19, 2025 at 4:30 am

    there are a few key things. First, lack of awareness or training. If employees don’t know the basics of security, they might accidentally click on phishing links or share sensitive info. Second, carelessness or laziness. For example, using weak passwords or not logging out of systems properly. Third, personal issues or disgruntlement. If an employee is unhappy at work, they might be tempted to steal data or cause harm. And finally, external influence, like being bribed or coerced by someone outside the company.

    Log in to Reply
  18. Wenhao GUO says

    June 19, 2025 at 7:54 am

    Employees can become information security threat actors due to multiple factors. Unintentional risks arise from lacking security awareness or training, such as using weak/reused passwords, leaving passwords on sticky notes, or mistakenly clicking phishing links, which can lead to brute-force attacks or data breaches, as seen in cases like Target’s incident. Intentional insider threats involve abusing privileges, such as unauthorized data theft or system sabotage, especially when employees hold excessive access rights. Additionally, employees often introduce risks by using personal USB drives, unapproved cloud storage, or devices, which may carry malware or cause leaks if lost/stolen. Phishing and scams also make employees vulnerable, as cybercriminals exploit them to penetrate corporate systems. Even with technological safeguards, insufficient training leaves employees unable to identify threats, turning simple actions like clicking a link into significant security disasters.

    Log in to Reply
  19. Jianwei Huang says

    June 19, 2025 at 9:42 am

    Factors that make an employee an information security threat often start with lack of awareness. If they don’t know about risks like phishing or weak passwords, they might unknowingly let threats in. Stress or hurry can also play a part—rushed employees might skip security steps, like not logging out of accounts. Sometimes, poor training means they don’t understand how to handle sensitive data. Personal issues, like financial problems, could make a few employees tempted to misuse info for gain. Also, if an organization has loose policies or doesn’t monitor access properly, it might enable accidental or intentional security breaches. Ultimately, it’s a mix of human error, lack of knowledge, personal pressures, and weak workplace security measures that can turn an employee into a threat.

    Log in to Reply
  20. Xiaojin Liu says

    June 19, 2025 at 11:06 am

    Insufficient employee safety awareness: failure to identify phishing emails, malicious links or social engineering attacks; neglect of password security; operational errors; non-compliance with backup policies or data classification rules; violation of company security policies.
    A few employees may deliberately undermine security due to malicious motives or for personal gain: stealing data for sale or revenge; abusing privileges; participating in ransomware attacks or assisting external hackers; deliberately ignoring security measures to speed up work processes; deleting data or leaking confidential information upon leaving the company.

    Log in to Reply
  21. Jiwei Yang says

    June 19, 2025 at 10:37 pm

    Employees become a threat to information security due to the interplay of personal and organizational factors. At the individual level, insufficient security awareness leads to vulnerability to phishing attacks (such as when Target supplier employees disclose credentials), failure to follow protocols (such as ignoring FireEye alerts), lack of training (such as misjudging risks), and operational errors (such as incorrect system configuration). These are all potential risks. At the organizational level, lax access control for third-party suppliers (such as Target not strictly managing Fazio’s permissions), weak security culture (treating security as a burden), and the absence of accountability mechanisms also exacerbate the risks. The Target case shows that when these factors combine, they can bypass advanced security facilities, highlighting the crucial role of employees’ security awareness, organizational process control, and supplier risk management in information security.

    Log in to Reply
  22. Shouxi Mou says

    June 20, 2025 at 12:45 am

    ​​Factors Making Employees Security Threats:​​\
    ​​Negligence​​ – Skipping security steps
    ​​Ignorance​​ – Untrained on risks
    ​​Malice​​ – Intentional data theft
    ​​Pressure​​ – Bypassing rules to meet deadlines

    Log in to Reply
  23. Yan Liu says

    June 20, 2025 at 1:08 am

    Employees can emerge as information security threats due to multiple factors. Lack of security awareness or training often leads to inadvertent risks, such as posting account passwords on sticky notes near computers, inviting theft. Abuse of privileges poses another hazard—employees with excessive authority face higher risks of insider data leaks. Additionally, employees are vulnerable to phishing and scams, which can serve as entry points for breaching corporate information security. These factors highlight the need for robust training and privilege management to mitigate internal security vulnerabilities.

    Log in to Reply
  24. Huiling Huang says

    June 20, 2025 at 4:11 am

    There are several reasons why an employee might become a threat to information security. Some people are just careless—like clicking on a sketchy email link without thinking, or leaving important company files lying around in a public area where anyone can grab them. Others don’t follow basic safety rules, like using a simple password (maybe their birthday) or sharing their account login with a colleague, which makes it easy for bad guys to sneak in. If an employee is unhappy with the company or gets tempted by someone offering money, they might even copy data on purpose and leak it to a competitor. Sometimes, employees haven’t had enough security training, so they don’t realize risks—like plugging a personal USB drive into a work computer, which could bring in a virus. Most of the time, it’s not on purpose, but whether it’s carelessness, not knowing the rules, or being influenced by emotions or money, their actions can put the company’s info in danger.

    Log in to Reply
  25. Xinshang Pei says

    June 21, 2025 at 12:23 pm

    Employee-related information security vulnerabilities stem from three interconnected dimensions. At the individual level, gaps in security awareness and habitual non-compliance with protocols often arise from inadequate understanding of cyber risks or simple negligence in daily operations. Organizations compound these issues when they fail to invest sufficiently in continuous security training or neglect to foster a robust culture of cyber vigilance, effectively creating systemic weaknesses that transform otherwise trustworthy staff into potential threat vectors. Exacerbating these internal factors are external threats like sophisticated social engineering schemes that prey on human psychology, manipulating employees through carefully crafted pressures or enticing rewards. This triad of personal, organizational, and external pressures creates a complex risk landscape that demands layered defensive strategies addressing both technological controls and human behavior modification.

    Log in to Reply
  26. Gao Yujing says

    June 21, 2025 at 2:12 pm

    Factors Making Employees Information Security Threat Actors​​
    ​​1. Malicious Intent (Active Threats)​​
    ​​Financial Gain​​:
    Selling data (e.g., customer records 1−1000/record on dark web).
    Accepting bribes to plant backdoors (e.g., Twitter staff hijacking accounts for $1M).
    ​​Revenge Motivation​​:
    Retaliation for demotion/firing (e.g., Tesla employee sabotaging assembly line code).
    Workplace bullying triggering data destruction.
    ​​Ideological Conflict​​:
    Disrupting unethical practices (e.g., leaking animal testing data).
    ​​2. Capability Conditions (Access & Skills)​​
    ​​Privilege Abuse​​:
    Unrestricted admin rights (e.g., DBAs exporting entire user databases).
    Delayed access revocation (ex-employees retaining VPN access).
    ​​Technical Skills​​:
    Developers bypassing audits to implant backdoors (e.g., GitLab $100M sabotage).
    Sysadmins tampering with logs to cover tracks.
    ​​3. Management Failures (Creating Opportunities)​​
    ​​Access Control Gaps​​:
    Overprivileged users (e.g., support staff accessing full customer DBs).
    Violating least privilege (interns in production environments).
    ​​Monitoring Blind Spots​​:
    No UEBA systems → missed alerts for anomalies (e.g., midnight bulk data downloads).
    Audit logs retained <30 days → unable to trace historical actions.
    ​​Toxic Culture​​:
    Weak whistleblowing mechanisms (fear of reporting).
    High-pressure KPIs incentivizing cover-ups (e.g., hiding accidental data deletion).
    ​​4. Unintentional Errors (Passive Threats)​​
    ​​Security Illiteracy​​:
    Clicking phishing links (cause of 35% breaches, Verizon DBIR).
    Weak passwords (e.g., "Company@2024" cracked in seconds).
    ​​Process Violations​​:
    Sending files via personal email (data leaks).
    Unencrypted laptops lost/stolen (exposing client data).
    ​​5. External Manipulation (Exploitation)​​
    ​​Social Engineering​​:
    Fake IT requests for credentials ("system upgrade requires password").
    Malware-laced phishing attachments (e.g., fake "payroll" documents).
    ​​Coercion​​:
    Blackmail threatening to expose private secrets for network access.

    Log in to Reply
  27. Yangyu Zhang says

    June 21, 2025 at 5:37 pm

    Employees can become information security threat actors due to a complex interplay of personal motivations, organizational failures, and external pressures. While most employees pose unintentional risks (e.g., clicking phishing links), deliberate threat actors typically emerge from these key factors:
    1.Malicious Motivations
    2.Organizational Failures
    3.Psychological & Situational Triggers
    4.Skill Exploitation
    5.Systemic Vulnerabilities

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in