Fig. 1From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisFlow chart of literature synthesisBack to article page