1. Proofpoint, Inc: 2022 COST OF INSIDER THREATS GLOBAL REPORT. Proofpoint., 2022 COST OF INSIDER THREATS GLOBAL REPORT. Proofpoint. https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats. Accessed 3 July 2023
2. Maxion, R.A.: Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud. 63(10), 25–50 (2005)
3. Carl, C.: Human factors in information security: the insider threat – Who can you trust these days? Inf. Secur. Tech. Rep. 14, 189–196 (2009)
4. Schoenherr, J.R., Lilja-Lolax, K., Gioe, D.: Multiple Approach Paths to Insider Threat (MAP-IT): Intentional, Ambivalent and Unintentional Insider Threats, Counter-Insider Threat Research and Practice. https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats. Accessed 3 July 2023
5. Nakamura, I., Hyodo, T., Soga, M., et al.: A practical approach for security measure selection problem and its availability, IPSJ J. 1445(8), 2022–2033(2004). (in Japanese)