1. Alhojailan, M.I.: Thematic analysis: a critical review of its process and evaluation. West East J. Soc. Sci. 1, 39–47 (2012)
2. Amin, M., Tariq, Z.:. Securing the car: how intrusive manufacturer-supplier approaches can reduce cybersecurity vulnerabilities. Technol. Innov. Manage. Rev. 5(1), 21–25 (2015). http://timreview.ca/article/863
3. Bean, T.: The auto repair shop's role in connected car cybersecurity (2017). https://www.ratchetandwrench.com/articles/5410-the-auto-repair-shops-role-in-connected-car-cybersecurity
4. Bergström, N.: Nya krav på verkstäder. Motorbranschen (2021). https://motorbranschen.mrf.se/nya-krav-pa-fria-verkstader/
5. Buecker, A., et al.: Using the IBM security framework and IBM Security blueprint to realize business-driven security (1). IBM Redbooks (2013). https://www.redbooks.ibm.com/redbooks/pdfs/sg248100.pdf