References
- Agrell, W. (2010). Fredens illusioner: det svenska nationella försvarets nedgång och fall 1988-2009 [Illusions of peace: the decline and fall of the Swedish national defense 1988-2009]. Bokförlaget Atlantis.
- Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice-Hall.
- Beaumont, P. (2023). Who is Jack Teixeira, the man arrested over Pentagon files leak? The Guardian, April 13.
- Bélanger, J., Schumpe, B., Nociti, N., Moyano, M., Dandeneau, S., Chamberland, P.-E., & Vallerand, R. (2019). Passion and moral disengagement: Different pathways to political activism. Journal of Personality, 87(6), 1234–1249. https://doi.org/10.1111/jopy.12470
- Bellman, B. L. (1981). The paradox of secrecy. Human Studies, 4(1), 1–24. https://doi.org/10.1007/BF02127445
- Bennett, L. (2011). Bunkerology—A case study in the theory and practice of urban exploration. Environment and Planning D: Society and Space, 29(3), 421–434. https://doi.org/10.1068/d13410
- Burcher, M., & Whelan, C. (2018). Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime, 21(3), 278–294. https://doi.org/10.1007/s12117-017-9313-8
- Burkett, B. G., & Whitley, G. (1998). Stolen valor: How the Vietnam generation was robbed of its heroes and its history. Verity Press.
- Cialdini, R. B. (2021). Influence, new and expanded: The psychology of Persuasion. Pearson.
- Diester, J. (2009). Geheimakte Regierungsbunker: Tagebuch eines Staatsgeheimnisses [The government bunker files: diary of a state secret]. Verlagsanstalt Handwerk G.
- Dunbar, R. (1991). Functional significance of social grooming in primates. Folia Primatologica, 57(3), 121–131. https://doi.org/10.1159/000156574
- Ek, B. T. & Bergqvist, U. (2021, October 6). Gräns: Nätverket Som Kartlade Försvarets Hemligheter, Sveriges Radio.
- Eysenck, M., & Brysbaer, M. (2018). Fundamentals of cognition (3rd ed.). Routledge.
- Försvarsmakten. (2021). Reglemente Säkerhetstjänst. [Handbook Security] Högkvarteret.
- Gleditsch, N.-P., & Wilkes, O. (1981a). Forskning eller spionasje? [Research or espionage?]. PRIO Publications.
- Gleditsch, N.-P., & Wilkes, O. (1981b). Onkel Sams kaniner. Teknisk etterretning i Norge [Uncle Sam's Rabbits. Technical Intelligence in Norway]. PAX.
- Holmström, M. (2021). Nätverk av 60” militärt överintresserade” män avslöjat [Network of 60 "militarily over-interested" men exposed]. Dagens Nyheter, April 7.
- Jasko, K., Webber, D., Kruglanski, A., Gelfand, M., Taufiqurrohman, M., Hettiarachchi, M., & Gunaratna, R. (2020). Social context moderates the effects of quest for significance on violent extremism. Journal of Personality and Social Psychology, 118(6), 1165–1187. https://doi.org/10.1037/pspi0000198
- Jonsson, M., & Gustafsson, J. (2022). Espionage by Europeans 2010-2021. A preliminary review of court cases. Totalförsvarets Forskningsinstitut, FOI-R–5312—SE.
- Kelly, A. (2002). The psychology of secrets. Springer Science & Business Media.
- Lundgren, M. (2022). MÖP - ett säkerhetshot mot Försvarsmakten? [MÖP - a security threat to the Armed Forces?]. Försvarshögskolan.
- Militära underrättelse- & säkerhetstjänsten. (2020). Årsöversikt 2020 [Annual Report 2020]. Swedish Armed Forces.
- Norges offentlige utredninger. (2003, June 30). NOU 2003:18 Rikets sikkerhet, Straffelovkommisjonens delutredning VIII - Utredning fra et utvalg under Straffelovkommisjonen oppnevnt ved kongelig resolusjon.[National Security, the Criminal Law Commission's partial investigation VIII - Investigation by a committee under the Criminal Law Commission appointed by royal decree], Justis- og politidepartementet.
- Säkerhetspolisen. (2015, March 18). Årsbok 2014 [Situational Assessment 2014]. Swedish Security Service.
- Säkerhetspolisen. (2023, February 22). Årsbok 2022-2023, [Situational Assessment 2022/2023], Swedish Security Service.
- Schoenherr, J. R., Lilja-Lolax, K., & Gioe, D. (2022). Multiple approach paths to insider threat (MAP-IT): Intentional, ambivalent and unintentional insider threats. Counter-Insider Threat Research and Practice, 1(1), 1–23.
- Shaw, E., & Sellers, L. (2015). Application of the critical-path method to evaluate insider risks. Studies in Intelligence, 59(2), 1–8.
- Smith, C. (2022). John Cairncross, RASCLS and a reassessment of his motives. Intelligence and National Security, 37(4), 526–540. https://doi.org/10.1080/02684527.2022.2065613
- Sparrow, M. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13(3), 251–274. https://doi.org/10.1016/0378-8733(91)90008-H
- Swedish Criminal Code. (2019). Most updated translation. www.government.se (https://www.government.se/government-policy/judicial-system/the-swedish-criminal-code/
- Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin & S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33–37). Brooks/Cole.
- Toler, J. (2023). From Discord to 4chan: The improbable journey of a US intelligence leak, Bellingcat. https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/
- van Zomeren, M., Postmes, T., & Spears, R. (2008). Toward an integrative social identity model of collective action: A quantitative research synthesis of three socio-psychological perspectives. Psychological Bulletin, 134(4), 504–535. https://doi.org/10.1037/0033-2909.134.4.504
- Widén, J. (2006). The Wennerström spy case: A Western perspective. Intelligence and National Security, 21(6), 931–958.
- Wiebes, C. (2008). Operation ‘Piet’: The Joseph Sidney Petersen Jr. Spy Case, a Dutch ‘Mole’ inside the National Security Agency. Intelligence and National Security, 23(4), 488–535. https://doi.org/10.1080/02684520802293098
- Wilder, U. (2017). Why spy? The psychology of espionage. Studies in Intelligence, 61(2), 1–35.