1. National Insider Threat Task Force. (2016). Protect Your Organization from the Inside Out: Government Best Practices 6 (2016). www.dni.gov/files/NCSC/documents/products/Govt_Best_Practices_Guide_Insider_Threat.pdf.
2. Sussman, B., “Top 20 Cybersecurity Quotes You Need to Hear”. https://www.secureworld.io/industry-new/top-20-cybersecurity-quotes.
3. A descriptive literature review and classification of insider threat research;Ophoff,2014
4. Proceedings of the Northwest Cybersecurity Symposium
5. Greitzer, F.L., Kangas, LJ, Noonan CF and Dalton, AC, “Identifying At Risk Employees: A Behavioral Model of Predicting Potential Insider Threats,” PNNL 19665, https://www.researchgate.net/publication/255218495_Identifying_at_risk_employees_A_behavioral_model_for_predicting_potential_insider_threats.