“…Financial and intellectual property damages continue to rise as a result of insider threats (Cole, 2015;Gorg, Kang, Liu, & Stasko, 2013;Inibhunu et al, 2016;Pfleeger & Stolfo, 2009). The purpose of this study is to address the prevalent challenge within the cybersecurity industry when detecting potentially malicious insider cyber threats and enabling the visualization of threats as they occur.…”