1. Fraud risk factors of fraud triangle and the likelihood of fraud occurrence: Evidence from Malaysia.;S. F.Aghghaleh;Information Management and Business Review,2014
2. Ansanelli, J. (2005, February 21). Are employees the biggest threat to network security? Network World, 22(7), 56. Retrieved from http://www.networkworld.com/article/2318535/lan-wan/employees-the-biggest-threat-to-network-security.html
3. Model checking authorization requirements in business processes
4. Association of Certified Fraud Examiners. (2014). Fraud examiners manual (US ed.). Association of Certified Fraud Examiners. Retrieved from https://www.acfe.com/uploadedFiles/Shared_Content/Products/Books_and_Manuals/MainTOC_2014_Final.pdf
5. Association of Certified Fraud Examiners (ACFE). (2016). Report to the nations on occupational fraud and abuse. Retrieved from http://www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf