1. Reisig, W.: Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies. Springer, New York (2013).
https://doi.org/10.1007/978-3-642-33278-4
2. Object Management Group. OMG Unified Modeling Language TM (OMG UML), Version 2.5 (2015)
3. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), vol. 119 (2016)
4. Alpers, S., Pilipchuk, R., Oberweis, A., Reussner, R.: Identifying needs for a holistic modelling approach to privacy aspects in enterprise software systems. In: Presented at the 4th International Conference on Information Systems Security and Privacy, pp. 74–82 (2018)
5. Accenture. Cost of cyber crime study (2017).
https://www.accenture.com/us-en/insight-cost-of-cybercrime-2017
. Accessed 26 Jun 2018