Insider Threat Mitigation Models Based on Thresholds and Dependencies