1. International Telecommunication Union—Joint Coordination Activity for Identity Management (JCA-IdM), Scope of identity management, (n.d.).
2. Digital Identity: Unmasking identity management architecture (IMA);Windley,2005
3. J. Carroll, J. Murphy, M. St Kilda, Who am I? I am Me! identity management in a networked world, in: 2004.
4. The seven flaws of identity management: usability and security challenges;Dhamija;IEEE Secur. Priv.,2008
5. A Longitudinal study of unauthorized access attempts on information systems: the role of opportunity contexts;Wang;MIS. Q.,2019