Mechanisms used
Social engineering 21%
Laptops 18%
Remote access 17%
E-mail 17%
Copy data to mobile device 16%
Characteristics displayed
Violation of IT security policies 27%
Misuse of organization’s resources 18%
Disruptive workplace behavior 10%
Formal reprimands/disciplinary
action 8%
Poor performancereviews 7%
Reasons for committing cybercrime
Financial gain 16%
Curiosity 12% Revenge 10%
Non-financial personal benefit 7%
Excitement 6%