1. Accelerated learning through serious game technology (2008). URL http://www.dodsbir.net/sitis/archives_display_topic.asp? Bookmark =34520 SBIR OSD08-CR8: Human Systems
2. Band, S.R., Cappelli, D.M., Fischer, L.F., Moore, A.P., Shaw, E.D., Trzeciak, R.F.: Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis. Tech. Rep. CMU/SEI-2006-TR-026, Carnegie Mellon University Software Engineering Institute (2006)
3. Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation. Tech. Rep. EST-TR-75-306, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA (1975)
4. Bishop, M.: Computer Security: Art and Science. Addison-Wesley Professional, Boston, MA (2003)
5. Bishop, M., Engle, S., Gates, C., Peisert, S., Whalen, S.: We Have Met the Enemy and He is Us. In: Proceedings of the 2008 New Security Paradigms Workshop (NSPW). Lake Tahoe, CA (2008)