1. Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., & Sheth, A. (2005). An ontological approach to the document access problem of insider threat, proceedings of the IEEE international conference on intelligence and security informatics (ISI) 2005 (pp. 486–491). Georgia: Atlanta.
2. Anderson, R.H. (1999). Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems (RAND CF-151-OSD). Technical report, RAND Corporation.
3. Anderson, R.H., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M., & VanWyk, K. (2000). Research on mitigating the insider threat to information systems #2 (RAND CF-163-DARPA). Technical report, RAND Corporation.
4. Brackney, R.C., & Anderson, R.H. (2004). Understanding the insider threat (RAND CF-196-ARDA). Technical report, RAND Corporation.
5. Cappelli, D., Moore, A., & Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Addison-Wesley Professional.