1. http://www.gemalto.com/press/Pages/Gemalto-releases-findings-of-2016-Breach-Level-Index.aspx
2. Chris King, “Spotlight On: Malicious Insiders and Organized Crime Activity”, Technical note, CMU/SEI-2012-TN-001, Jan. 2012.
3. G. Fyffe, “Addressing insider threat,” Network Security, vol. 2008, no.3, pp. 11–14, 2008.
4. S. L. Pfleeger and S. J. Stolfo, “Addressing the insider threat,” IEEE Security & Privacy, vol. 7, no. 6, pp. 10–13, 2009.
5. E. Cole and S. Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft: Protecting the Enterprise from Sabotage, Spying, and Theft. Syngress, 2005.