“…IoT Security [35] Identity Resolution Security Trust, user experience [36] IoT Device Security Known vulnerabilities, sensor capabilities, operational context [37] Fog-IoT Security Authentication, access control, intrusion detection, trust, integrity [38] Level of Trust in Fog Quality of service, quality of security [39] Internet of Health Security Confidentiality, authentication, access control, and integrity [41] IoT in the Enterprise Tangible factors, intangible factors [42] IoT Security Perceptual, transport, application, and cloud security Web Application Security [43] Website Usability-Security Confidentiality, integrity, accountability, authentication, durability, usability [44] Sustainable Security Confidentiality, integrity, availability, per-durability [45] Website Security Accidental threat, malicious threat, physical attach, malicious code, or virus Application Security [46] Software Security Integrity, access control, confidentiality, and authentication [47] Usability Security Confidentiality, integrity, accountability, authentication, durability, usability [48] Nuclear Plant Security Attacker's skill, physical access, logical access, and attack surface [49] HRIS Security Confidentiality, integrity, non-repudiation, privacy, and availability [50] E-Commerce Security Technical, environmental, managerial [51] E-Banking Security Management, technology, economy, and culture…”