Source: https://security.research.ucf.edu/Documents/CI/Insider_Threats.pdf