Source: https://www.researchgate.net/publication/337438838_Insider_threats_in_Cyber_Security_The_enemy_within_the_gates.pdf