S. Band, D. Cappelli, L. Fischer, A. Moore, E. Shaw et al., Comparing Insider IT Sabotage and Espionage: A Model- Based Analysis, 2006.

S. Boss, D. Galletta, P. Lowry, G. Moody, and P. Polak, What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors, MIS Quarterly, vol.39, issue.4, pp.837-864, 2015.
DOI : 10.25300/MISQ/2015/39.4.5

H. Chivers, J. Clark, P. Nobles, S. Shaikh, and H. Chen, Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise, Information Systems Frontiers, vol.10, issue.1/2, pp.17-34, 2013.
DOI : 10.3233/JCS-2002-101-205

URL : http://eprints.whiterose.ac.uk/75047/1/Knowing_Who_to_Watch_Identifying_attackers_whose_actions_are_hidden.pdf

D. Costa, M. Collins, S. Perl, M. Albrethsen, G. Silowash et al., An Ontology for Insider Threat Indicators: Development and Application, Proceedings of the Ninth Conference on Semantic Technology for Intelligence, Defense and Security, pp.48-53, 2014.

D. Dishneau, Army general upholds Chelsea Manning's conviction, 35-year sentence in WikiLeaks case, U.S. News and World Report, 2014.

F. Farahmand and E. Spafford, Understanding insiders: An analysis of risk-taking behavior, Information Systems Frontiers, vol.35, issue.9, pp.5-15, 2013.
DOI : 10.1037/0003-066X.35.2.151

J. Gallu, Snowden used " web crawler " to scrape NSA, Bloomberg Technology, 2014.

S. Garfinkel, M57-Patents Scenario, Digital Corpora (digitalcor pora.org/corpora/scenarios/m57-patents-scenario, p.2017

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, Bringing science to digital forensics with standardized forensic corpora, Digital Investigation, pp.2-11, 2009.
DOI : 10.1016/j.diin.2009.06.016

K. Guo, Y. Yuan, N. Archer, and C. Connelly, Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model, Journal of Management Information Systems, vol.15, issue.4, pp.203-236, 2011.
DOI : 10.1080/07421222.1999.11518226

M. Hanley and J. Montelibano, Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination, 2011.
DOI : 10.21236/ADA610463

K. Herbig and M. Wiskoff, Espionage Against the United States by American Citizens, 1947.

P. Huber and E. Ronchetti, Robust Statistics, 2009.
DOI : 10.1002/0471725250

L. Kramer, R. Heuer, and K. Crawford, Technological, Social and Economic Trends that are Increasing U.S. Vulnerability to Insider Espionage, 2005.
DOI : 10.21236/ada433793

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA433793&Location=U2&doc=GetTRDoc.pdf

M. Maasberg, Insider espionage: Recognizing ritualistic behavior by abstracting technical indicators from past cases, Proceedings of the Twentieth Americas Conference on Information Systems, 2014.

M. Mandiant, Trends 2015: A View from the Front Line, 2014.

A. Moore, D. Mcintire, D. Mundie, and D. Zubrow, The justification of a pattern for detecting intellectual property theft by departing insiders, Proceedings of the Nineteenth Conference on Pattern Languages of Programs, 2012.
DOI : 10.21236/ADA610785

P. Rousseeuw and A. Leroy, Robust Regression and Outlier Detection, 2003.
DOI : 10.1002/0471725382

K. Singh and S. Upadhyaya, Outlier detection: Applications and techniques, International Journal of Computer Science Issues, vol.9, issue.1, pp.307-323, 2012.

J. Wang, M. Gupta, and R. Rao, Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, MIS Quarterly, vol.39, issue.1, pp.91-112, 2015.
DOI : 10.25300/MISQ/2015/39.1.05

R. Willison and M. Warkentin, Beyond Deterrence: An Expanded View of Employee Computer Abuse, MIS Quarterly, vol.37, issue.1, pp.1-20, 2013.
DOI : 10.25300/MISQ/2013/37.1.01