Modeling insider threat types in cyber organizations | IEEE Conference Publication | IEEE Xplore