1. Gender difference and employees' cybersecurity behaviors
2. Bada, M., Sass, A. M., & Nurse, J. R. C. (2014). Cyber Security Awareness Campaigns Why do they fail to change behaviour? Academic Press.
3. Defining the insider threat
4. Bishop, M., Gollmann, D., Hunker, J., & Probst, C. W. (2008). Countering insider threats. In Dagstuhl Seminar Proceedings 08302 (pp. 1–18). Academic Press. Retrieved from http://vesta.informatik.rwth-aachen.de/opus/volltexte/2008/1793/pdf/08302.SWM.1793.pdf
5. Domain-Specific Risk-Taking Scale