1DoJ. A review of the FBI's performance in deterring, detecting, and investigating the espionage activities of robert philip Hanssen[R]. Washington, DC: United States Department of Justice, 2003. http:www.usdoj.gov/oig/special/0308/final.pdf.
2GAO. Critical infrastructure protection: Challenges and efforts to secure control systems[R]. Washington, DC: United States General Accounting Office, 2004. http://www.gao.gov/new. items/d04354.pdf.
3Edward Hurley. CSI: Examining threats from inside the firewall [R]. Needham, MA: TechTarget Network, 2002. http://searchsecurity.techtarget.com/originalContent/0,289142, sid14_ gci863439,00.html.
4DoD. Insider threat mitigation, final report of the insider threat integrated process team[R]. Washington, DC: United States Department of Defense, 2000-04-24. http://www.c3i.osd.mil.
5JD Michelle Keeney, Eileen Kowalski, Dawn Cappelli, et al. Insider threat study: Computer system sabotage in critical infrastructure sectors[R]. Washington, DC: United States Secret Service,2005.http://www.cert.org/archive/pdf/insidercross051105.pdf.
6Sara Matzner. Approaches to insider threat mitigation[Z]. ISSA Journal, 2004:6-8.