Source: https://www.jas-solution.com/document/ObserveIT/The_Ultimate_Guide_to_Building_and_Insider_Threat_Program_eBook.pdf