1. Whitman, M., Mattord, H.: Management of Information Security, 4th edn. Cengage Learning, Boston (2013)
2. Schultz, E.E.: A framework for understanding and predicting insider attacks. Comput. Secur. 21(6), 526–531 (2002)
3. Cohen, F.: How do we measure security? INCOSE Insight 14(2), 30–32 (2011)
4. ISO/IEC_JTC1: ISO/IEC FDIS 27000 information technology - security techniques - information security management systems - overview and vocabulary. ISO Copyright Office, Geneva, Switzerland (2009)
5. Wood, B.: An insider threat model for adversary simulation. In: Anderson, R.H. (ed.) Research on Mitigating the Insider Threat to Information Systems. RAND (2000)