1. 2015 Vormetric Insider Threat Report. https://www.vormetric.com/campaigns/insiderthreat/2015/ . Accessed 20 Oct 2016
2. 2016 Insider Threat Spotlight Report. http://www.veriato.com/docs/default-source/whitepapers/insider-threat-report-2016.pdf . Accessed 20 Oct 2016
3. Zaytsev, A., Malyuk, A.: Research on internal intruder’s problem. Vestnik RGGU 14, 114–134 (2012). Moscow (in Russian)
4. Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J., Flynn, L.: Common Sense Guide to Mitigating Insider Treats, 4th edn., 144 p. Carnegie-Mellon University, Software Engineering Institute, CERT Program, Pittsburg (2012)
5. Randazzo, M.R., Keeney, M., Kowalski, E., Cappelli, D., Moore, A.: Insider Treat Study: Illicit Cyber Activity in the Banking and Finance Sector, 37 p. Carnegie-Mellon University, Software Engineering Institute, CERT Coordination Center, Pittsburg (2005)