1. W. Baker, M. Goudie, A. Hutton, C. D. Hylender, J. Niemantsverdriet, and C. Novak, et al., “Version 2010 data breach investigations report,” 2010.
2. R. Richardson, “2010/2011 CSI computer crime & security survey,” 2011.
3. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Comput. Secur. vol. 32, pp. 90–101, Feb. 2013.
4. R. Willison and M. Warkentin, “Beyond deterrence: An expanded view of employee computer abuse,” Manage. Inf. Syst. Q., vol. 37, no. 1, pp. 1–20, Mar. 2013.
5. R. Willison and M. Siponen, “Overcoming the insider: Reducing employee computer crime through situational crime prevention,” Commun. ACM, vol. 52, no. 9, pp. 133–137, Sep. 2009.