Dutt, V., Ahn, Y.-S. & Gonzalez, C., 2012. Cyber Situation
Awareness: Modeling Detection of Cyber Attacks With
Instance-Based Learning Theory. Human Factors: The
Journal of the Human Factors and Ergonomics Society,
55(3), pp.605–618. Available at: http://hfs.sagepub.
com/cgi/doi/10.1177/001872081 2464045 [Accessed
May 4, 2015].
Eisenhardt, K., 1989. (1989) Building theories from case
study research A. M. Huberman & M. B. Miles, eds.
Academy of Management Review, 14(4), pp.532–550.
Evans Pughe, C., 2008. A crisis of identity. , (June).
Available at: www.theiet.org/engtechmag.
Fettke, P. & Loos, P. eds., 2007. Reference Modeling for
Business Systems Analysis, Idea Group Publishing.
Jason, B. & Mitchell, J.C., 2011. Security Modeling and
Analysis. IEEE Security and Privacy, 9(June), pp.18–
25. Available at: http://ieeexplore.ieee.org/xpl/article
Details.jsp?arnumber=5708126.
Kostadinov, D., 2014. Cyber Threat Analysis. Infosec
Institute. Available at: http://resources.infosecinstitute.
com/cyber-threat-analysis/.
March, S.T. & Smith, G.F., 1995. Design and natural
science research on information technology. Decision
Support Systems, 15, pp.251–266.
Möckel, C. & Abdallah, A.E., 2010. Threat modeling
approaches and tools for securing architectural designs
of an e-banking application. 2010 6th International
Conference on Information Assurance and Security,
IAS 2010, pp.149–154.
Myagmar, S., 2005. Threat Modeling as a Basis for Security
Requirements. In StorageSS ’05: Proceedings of the
2005 ACM workshop on Storage security and
survivability, pp.94–102.
Novakouski, M., 2013. User-Centric Identity Management:
A Future Vision for IdM. CrossTalk: The Journal of
Defense Software Engineering, 26(September-
October).
Paintsil, E., 2013. Towards Automation of Privacy and
Security Risks Analysis in Identity Management
Systems. 2013 12th IEEE International Conference on
Trust, Security and Privacy in Computing and
Communications, pp.720–727. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?
arnumber=6680907 [Accessed April 21, 2015].
Pudar, S., Manimaran, G. & Liu, C.-C., 2009. PENET: A
practical method and tool for integrated modeling of
security attacks and countermeasures. Computers &
Security, 28(8), pp.754–771. Available at:
http://linkinghub.elsevier.com/retrieve/pii/S01674048
09000522 [Accessed August 3, 2015].
Pwc, 2011. Cybercrime: Global Economic Crime Survey. ,
(November). Available at: www.pwc.com/
crimesurvey.
Rosemann, M., 2003. Application Reference Models and
Building Blocks for Management and Control. In P.
Bernus, L. Nemes, & G. Schmidt, eds. Handbook on
Enterprise Architecture SE - 17. International
Handbooks on Information Systems. Springer Berlin
Heidelberg, pp. 595–615. Available at:
http://dx.doi.org/10.1007/978-3-540-24744-9_17.
Shostack, A., 2014. Threat Modeling: Designing for
Security, John Wiley & Sons, Inc.
Siponen, M. & Vance, A., 2010. Neutralization: New
Insights Into The Problem Of Employee Information
Systems Security Violations. MIS Quarterly, 34(3),
pp.487–502.
Slamanig, D. & Stranacher, K., 2014. User-Centric Identity
as a Service-Architecture for eIDs with Selective
Attribute Disclosure. , pp.153–163.
Staite, C. & Bahsoon, R., 2012. Evaluating identity
management architectures. In Proceedings of the 3rd
international ACM SIGSOFT symposium on Architecting
Critical Systems - ISARCS ’12. New York, New York,
USA: ACM Press, p. 11. Available at:
http://dl.acm.org/citation.cfm?doid=2304656.2304659.
Stango, A., Prasad, N.R. & Kyriazanos, D.M., 2009. A
threat analysis methodology for security evaluation and
enhancement planning. Proceedings - 2009 3rd
International Conference on Emerging Security
Information, Systems and Technologies, SECURWARE
2009, pp.262–267.
UcedaVélez, T. & Morana, M.M., 2015. Risk Centric
Threat Modeling: Process for Attack Simulation and
Threat Analysis,
Xu, D. & Nygard, K., 2005. A Threat-Driven Approach to
Modeling and Verifying Secure Software., pp.342–346.
Zissis, D. & Lekkas, D., 2012. Addressing cloud computing
security issues. Future Generation Computer Systems,
28(3), pp.583–592. Available at: http://linking
hub.elsevier.com/retrieve/pii/S0167739X10002554
[Accessed July 11, 2014].