| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка | 
| Insider Threat Combating the enemy within | JULY 2010 | 485 | 7 | Атаки инсайдоров (своих сотрудников) | 
| Monitoring, Detecting and Preventing Insider Fraud and Abuse Dan Sullivan | 2012 | 429 | 20 | |
| Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors Michelle Keeney et all | May 2005 | 167 | 45 | |
| Insiders’ Guide to Evaluating Remote Control Software Three Fundamental Rules for Choosing the Best | 2012 | 111 | 9 | |
| Protecting Against WikiLeaks Type Events and the Insider Threat | JANUARY 2011 | 158 | 10 | |
| An Inside Track on Insider Threats | 2012 | 356 | 11 | |
| Five Significant Insider Attacks Of 2012 | Dec 17, 2012 | 1279 | 6 | By Robert Lemos | 
| Monitoring, Detecting and Preventing Insider Fraud and Abuse | 2013 | 429 | 20 | Dan Sullivan | 
| The Risk of Insider Fraud U.S. Study of IT and Business Practitioners | October 2011 | 451 | 22 | Ponemon Institute | 
| In 2017, the Insider Threat Epidemic Begins | February 2017 | 2673 | 52 | James Scott, Drew Spaniel ICIT |