1. Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T.J.: Common Sense Guide to Prevention and Detection of Insider Threats. CERT, January 2009. http://www.cert.org/archive/pdf/CSG-V3.pdf . Accessed 20 June 2011
2. Bishop, M.: Position: Insider is Relative. University of California at Davis. http://www.nspw.org/papers/2005/nspw2005-bishop-pos.pdf . Accessed 01 Sept 2013
3. Bishop, M., Gates, C.: Defining the Insider Threat. University of California at Davis, CA Labs
4. von Roessing, R.M.: The business model for information security. ISACA© 2010
5. Green, C.H.: Understanding the Trust Equation. http://trustedadvisor.com . Accessed 19 Sept 2013