Analyzing and Interpreting the Threat Mitigation Strategies in Information Systems Conceptual and Operational Explorations