REFERENCES
Amazon. (2019). Amazon Privacy Notice. Retrieved from
https://www.amazon.co.uk/gp/help/customer/display.ht
ml/ref=gss?nodeId=502584
Ardagna, C. A., Damiani, E., Schütte, J., & Stephanow, P.
(2018). A case for IoT security assurance. In Internet of
Everything (pp. 175-192): Springer.
Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for
enterprise systems of modern manufacturing. IEEE
Transactions on industrial informatics, 10(2), 1537-
1546.
Bohanec, M. (2017). DEXi: A Program for Multi-Attribute
Decision Making. Retrieved from
https://kt.ijs.si/MarkoBohanec/dexi.html
Bohanec, M., Žnidaršič, M., Rajkovič, V., Bratko, I., &
Zupan, B. (2013). DEX methodology: three decades of
qualitative multi-attribute modeling. Informatica, 37(1).
CYBERWISER.eu. (2019). CYBERWISER.eu - Cyber
Range & Capacity Building in Cybersecurity. Retrieved
from https://www.cyberwiser.eu/
Erdogan, G., & Refsdal, A. (2017). A method for developing
qualitative security risk assessment algorithms. Paper
presented at the International Conference on Risks and
Security of Internet and Systems (CRiSIS'17).
Git. (2019). Git. Retrieved from https://git-scm.com/
Gradle. (2019). Gradle. Retrieved from https://gradle.org/
Gupta, S., Muntes-Mulero, V., Matthews, P., Dominiak, J.,
Omerovic, A., Aranda, J., & Seycek, S. (2015). Risk-
driven framework for decision support in cloud service
selection. Paper presented at the 15th IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing (CCGrid'15).
Hüttermann, M. (2012). DevOps for developers: Apress.
ISO. (2018). ISO/IEC 27005:2018(en) Information
technology — Security techniques — Information
security risk management. In.
Jenkins. (2019). Jenkins. Retrieved from https://jenkins.io/
Jira. (2019). Atlassian Jira. Retrieved from
https://www.atlassian.com/
Karabacak, B., & Sogukpinar, I. (2005). ISRAM:
information security risk analysis method. Computers &
Security, 24(2), 147-159.
Kim, G., Humble, J., Debois, P., & Willis, J. (2016). The
DevOps Handbook:: How to Create World-Class Agility,
Reliability, and Security in Technology Organizations:
IT Revolution.
Kumar, D., Paccagnella, R., Murley, P., Hennenfent, E.,
Mason, J., Bates, A., & Bailey, M. (2018). Skill squatting
attacks on Amazon Alexa. Paper presented at the 27th
USENIX Security Symposium (USENIX'18).
Leukert, B. (2016). IoT 2020: Smart and secure IoT platform.
Retrieved from
http://www.iec.ch/whitepaper/pdf/iecWP-loT2020-
LR.pdf
Lund, M. S., Solhaug, B., & Stølen, K. (2011). Model-Driven
Risk Analysis - The CORAS Approach: Springer-Verlag
Berlin Heidelberg.
Maven. (2019). Apache Maven Project. Retrieved from
https://maven.apache.org/
Meulen, R. v. d. (2017). Retrieved from
http://www.gartner.com/newsroom/id/3598917
Microsoft. (2019). Microsoft Threat Modeling. Retrieved
from https://www.microsoft.com/en-
us/securityengineering/sdl/threatmodeling
Myrbakken, H., & Colomo-Palacios, R. (2017). DevSecOps:
a multivocal literature review. Paper presented at the
17th International Conference on Software Process
Improvement and Capability Determination (SPICE'17).
Nagios. (2019). Nagios. Retrieved from
https://www.nagios.org/
NewRelic. (2019). New Relic. Retrieved from
https://newrelic.com/
Nguyen, P., Ferry, N., Erdogan, G., Song, H., Lavirotte, S.,
Tigli, J.-Y., & Solberg, A. (2019). Advances in
deployment and orchestration approaches for iot-a
systematic review. Paper presented at the 2019 IEEE
International Congress on Internet of Things (ICIOT'19).
RiskWatch. (2019). RiskWatch. Retrieved from
https://riskwatch.com/
Solhaug, B., & Stølen, K. (2013). The CORAS Language-
Why it is designed the way it is. Paper presented at the
11th International Conference on Structural Safety and
Reliability (ICOSSAR’13).
Taivalsaari, A., & Mikkonen, T. (2017). A roadmap to the
programmable world: software challenges in the IoT era.
IEEE Software, 34(1), 72-80.
Thompson, A. (2019). Tool-support for risk-driven planning:
risk-tool-frontend and risk-tool-backend. Retrieved from
https://github.com/ribako/risk-tool-frontend
Wieringa, R. J. (2014). Design science methodology for
information systems and software engineering: Springer.
Wired. (2018). Hackers Found a (Not-So-Easy) Way to Make
the Amazon Echo a Spy Bug. Retrieved from
https://www.wired.com/story/hackers-turn-amazon-
echo-into-spy-bug/
Xie, J., Lipford, H. R., & Chu, B. (2011). Why do
programmers make security errors? Paper presented at
the 2011 IEEE symposium on visual languages and
human-centric computing (VL/HCC).
Zeleny, M. (1998). Multiple criteria decision making: eight
concepts of optimality. Human Systems Management,
17(2), 97-107.