. E. Osmanoglu, Identity and Access Management: Business Performance Through Connected Intelligence, 2014.

E. Bertino and K. Takahashi, Identity management:concepts, technologies, and systems, 2011.

A. Ng, Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities, vol.13, p.9781522548287, 2018.

R. Moeller, Enterprise Risk Management: Establishing Effective Governance, Risk, and Compliance, Second Edition, 2011.

J. Scheidel, Designing an IAM Framework with Oracle Identity and Access Management Suite, 2010.

B. Ritchot, An Enterprise Security Program and Architecture to Support Business Drivers, Technology Innovation Management Review, vol.3, issue.8, 2013.

T. Scully, The cyber security threat stops in the boardroom, Journal of business continuity & emergency planning, vol.7, issue.2, pp.138-148, 2014.

J. L. Spears, H. Barki, and R. R. Barton, Theorizing the concept and role of assurance in information systems security, Information & management, vol.50, issue.7, pp.598-605, 2013.

N. Macehiter, A Confusing Array of Identity Management Pressures and Initiatives. What Drives Identity Management Requirements?, 2006.

R. Sharman, S. Smith, and M. Gupta, Digital Identity and Access Management: Technologies and Frameworks, 2012.

H. Tipton and M. Krause, Information Security Management Handbook, Sixth Edition, vol.1, 2007.

F. Damon and M. Coetzee, Towards a generic Identity and Access Assurance model by component analysis-A conceptual review, Enterprise Systems Conference (ES), pp.1-11, 2013.

P. Sarbanes, Sarbanes-Oxley Act of, The Public Company Accounting Reform and Investor Protection, 2002.

J. S. Burkett, Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®. Information Security Journal: A Global Perspective, vol.21, pp.47-54, 2012.

A. Calder and S. Watkins, IT governance: A manager's guide to data security and ISO 27001/ISO 27002, 2008.

P. White, Identity Management Architecture: a new direction, 8th IEEE International Conference on Computer and Information Technology, pp.408-413, 2008.

M. Dabrowski and P. Pacyna, Generic and Complete Three-Level Identity Management Model, Proceedings of 2nd International Conference on Emerging Security Information, Systems and Technologies, pp.232-237, 2008.

A. Buecker, Introducing the IBM Security Framework and IBM Security, 2011.

L. Jellema, Oracle SOA Suite 11g Handbook, 2011.

L. L. Delooze, Creating a Balanced Scorecard for Computer Security, IEEE Information Assurance Workshop, pp.15-18, 2006.

J. K. Sharma, Quantitative Techniques in Management, 2014.