Fig. 6From: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisApplication of various models in the existing IDPAs. ‘IDPAs’ represents insider threat detection and prediction algorithms. Individual behaviour model is represented by ‘IBM’, community behaviour model by ‘CBM’, resource usage model by ‘RUM’, mixed system by ‘MS’, capability model by ‘CM’, and intention model by ‘IM’Back to article page