1. Brackney, R., Anderson, R.: Understanding the insider threat. Technical report. RAND Corporation, Santa Monica (2004)
2. Bishop, M., Gates, C.: Defining the insider threat. In: Proceedings of the 4th Annual Workshop on Cyber Security and iNformation Intelligence Research, Oak Ridge (2008)
3. Maybury, M., Chase, P., Cheikes, B., Brackney, D., Matznera, S., Hetherington, T., Wood, B., Sibley, C., Marin, J., Longstaff, T.: Analysis and detection of malicious insiders. In: Proceedings of the International Conference on Intelligence Analysis, McLean (2005)
4. Magklaras, G., Furnell, S., Brooke, P.: Towards an insider threat prediction specification language. J. Inf. Manag. Comput. Secur. 14(4), 361–381 (2006)
5. Pfleeger, C., Pfleeger, S.: Security in Computing, 4th edn. Prentice Hall, Upper Saddle River (2006)