REFERENCES 
Amazon.  (2019).  Amazon  Privacy  Notice.  Retrieved  from 
https://www.amazon.co.uk/gp/help/customer/display.ht
ml/ref=gss?nodeId=502584 
Ardagna, C. A., Damiani, E., Schütte, J., & Stephanow, P. 
(2018). A case for IoT security assurance. In Internet of 
Everything (pp. 175-192): Springer. 
Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for 
enterprise  systems  of  modern  manufacturing.  IEEE 
Transactions on industrial informatics, 10(2),  1537-
1546.  
Bohanec, M. (2017). DEXi: A Program for Multi-Attribute 
Decision  Making.  Retrieved  from 
https://kt.ijs.si/MarkoBohanec/dexi.html 
Bohanec,  M.,  Žnidaršič,  M.,  Rajkovič,  V.,  Bratko,  I.,  & 
Zupan, B. (2013). DEX methodology: three decades of 
qualitative multi-attribute modeling. Informatica, 37(1).  
CYBERWISER.eu.  (2019).  CYBERWISER.eu  -  Cyber 
Range & Capacity Building in Cybersecurity. Retrieved 
from https://www.cyberwiser.eu/ 
Erdogan, G., & Refsdal, A. (2017). A method for developing 
qualitative security risk assessment algorithms.  Paper 
presented at the International Conference on Risks and 
Security of Internet and Systems (CRiSIS'17). 
Git. (2019). Git. Retrieved from https://git-scm.com/ 
Gradle. (2019). Gradle. Retrieved from https://gradle.org/ 
Gupta, S., Muntes-Mulero, V., Matthews, P., Dominiak, J., 
Omerovic,  A.,  Aranda,  J.,  &  Seycek,  S.  (2015).  Risk-
driven framework for decision support in cloud service 
selection.  Paper  presented  at  the  15th  IEEE/ACM 
International  Symposium  on  Cluster,  Cloud  and  Grid 
Computing (CCGrid'15). 
Hüttermann, M. (2012). DevOps for developers: Apress. 
ISO.  (2018).  ISO/IEC  27005:2018(en)  Information 
technology  —  Security  techniques  —  Information 
security risk management. In. 
Jenkins. (2019). Jenkins. Retrieved from https://jenkins.io/ 
Jira.  (2019).  Atlassian  Jira.  Retrieved  from 
https://www.atlassian.com/ 
Karabacak,  B.,  &  Sogukpinar,  I.  (2005).  ISRAM: 
information security risk analysis method. Computers & 
Security, 24(2), 147-159.  
Kim,  G.,  Humble,  J.,  Debois,  P.,  &  Willis,  J.  (2016).  The 
DevOps Handbook:: How to Create World-Class Agility, 
Reliability, and Security in Technology Organizations: 
IT Revolution. 
Kumar,  D.,  Paccagnella,  R.,  Murley,  P.,  Hennenfent,  E., 
Mason, J., Bates, A., & Bailey, M. (2018). Skill squatting 
attacks on Amazon Alexa.  Paper  presented  at  the  27th 
USENIX Security Symposium (USENIX'18). 
Leukert, B. (2016). IoT 2020: Smart and secure IoT platform. 
Retrieved  from 
http://www.iec.ch/whitepaper/pdf/iecWP-loT2020-
LR.pdf 
Lund, M. S., Solhaug, B., & Stølen, K. (2011). Model-Driven 
Risk Analysis - The CORAS Approach: Springer-Verlag 
Berlin Heidelberg. 
Maven.  (2019).  Apache  Maven  Project.  Retrieved  from 
https://maven.apache.org/ 
Meulen,  R.  v.  d.  (2017).  Retrieved  from 
http://www.gartner.com/newsroom/id/3598917 
Microsoft.  (2019).  Microsoft  Threat  Modeling.  Retrieved 
from  https://www.microsoft.com/en-
us/securityengineering/sdl/threatmodeling 
Myrbakken, H., & Colomo-Palacios, R. (2017). DevSecOps: 
a multivocal literature review.  Paper  presented  at  the 
17th  International  Conference  on  Software  Process 
Improvement and Capability Determination (SPICE'17). 
Nagios.  (2019).  Nagios.  Retrieved  from 
https://www.nagios.org/ 
NewRelic.  (2019).  New  Relic.  Retrieved  from 
https://newrelic.com/ 
Nguyen, P., Ferry, N., Erdogan, G., Song, H., Lavirotte, S., 
Tigli,  J.-Y.,  &  Solberg,  A.  (2019).  Advances in 
deployment and orchestration approaches for iot-a 
systematic review.  Paper  presented  at  the  2019  IEEE 
International Congress on Internet of Things (ICIOT'19). 
RiskWatch.  (2019).  RiskWatch.  Retrieved  from 
https://riskwatch.com/ 
Solhaug,  B.,  &  Stølen,  K.  (2013).  The CORAS Language-
Why it is designed the way it is. Paper presented at the 
11th International Conference  on Structural Safety and 
Reliability (ICOSSAR’13). 
Taivalsaari, A., & Mikkonen, T. (2017). A roadmap to the 
programmable world: software challenges in the IoT era. 
IEEE Software, 34(1), 72-80.  
Thompson, A. (2019). Tool-support for risk-driven planning: 
risk-tool-frontend and risk-tool-backend. Retrieved from 
https://github.com/ribako/risk-tool-frontend 
Wieringa,  R.  J.  (2014).  Design science methodology for 
information systems and software engineering: Springer. 
Wired. (2018). Hackers Found a (Not-So-Easy) Way to Make 
the  Amazon  Echo  a  Spy  Bug.  Retrieved  from 
https://www.wired.com/story/hackers-turn-amazon-
echo-into-spy-bug/ 
Xie,  J.,  Lipford,  H.  R.,  &  Chu,  B.  (2011).  Why do 
programmers make security errors? Paper presented at 
the  2011  IEEE  symposium  on  visual  languages  and 
human-centric computing (VL/HCC). 
Zeleny, M. (1998). Multiple criteria decision making: eight 
concepts  of  optimality.  Human Systems Management, 
17(2), 97-107.