Modelling of enterprise insider threats | IEEE Conference Publication | IEEE Xplore