1. Band, S., Cappelli, D., Fischer, L., Moore, A., Shaw, E., Trzeciak, R.: Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, Technical Report CMU/SEI-2006-TR-026, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania (2006)
2. Barnett, V., Lewis, T.: Outliers in Statistical Data. John Wiley and Sons, New York (1994)
3. Boss, S., Galletta, D., Lowry, P., Moody, G., Polak, P.: What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. Management Information Systems Quarterly 39(4), 837–864 (2015)
4. Chivers, H., Clark, J., Nobles, P., Shaikh, S., Chen, H.: Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Information Systems Frontiers 15(1), 17–34 (2013)
5. Costa, D., Collins, M., Perl, S., Albrethsen, M., Silowash, G., Spooner, D.: An ontology for insider threat indicators: development and application. In: Proceedings of the Ninth Conference on Semantic Technology for Intelligence, Defense and Security, pp. 48–53 (2014)