{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:14:39Z","timestamp":1725801279260},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/empire.2014.6890114","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:27:54Z","timestamp":1410359274000},"page":"36-43","source":"Crossref","is-referenced-by-count":8,"title":["Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems"],"prefix":"10.1109","author":[{"given":"Naveed","family":"Ikram","sequence":"first","affiliation":[]},{"given":"Surayya","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Naurin Farooq","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1067","article-title":"Security requirements engineering: A road map","author":"araujo","year":"2007","journal-title":"Secur Feature"},{"key":"ref11","article-title":"Security Requirements Engineering: A Survey","author":"romero-mariona","year":"2008","journal-title":"Technical Report UCI-ISR-08-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_50"},{"journal-title":"Eight to Late","article-title":"The what and whence of issue-based information systems","year":"0","key":"ref13"},{"key":"ref14","article-title":"Growing a Global Issue Base: An Issue-based Approach to Policy Deliberation","author":"conklin","year":"2008","journal-title":"Dir Implic Adv Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref16","first-page":"145","article-title":"Modelling the interplay of conflicting goals with use and misuse cases","author":"alexander","year":"2002","journal-title":"Proceedings of 8th International Workshop on Requirements Engineering Foundation for Software Quality (REFSQ'02)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"key":"ref18","article-title":"An extended misuse case notation: Including vulnerabilities and the insider threat","author":"r?stad","year":"2006","journal-title":"XII Working Conference on Requirements Engineering Foundation for Software Quality"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0037-9_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11751595_109"},{"article-title":"Security quality requirements engineering (SQUARE): case study phase III","year":"2006","author":"chung","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73031-6_24"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.19"},{"key":"ref2","article-title":"A comparative evaluation of three approaches to specifying security requirements","author":"diallo","year":"2006","journal-title":"12th Working Conference on Requirements Engineering Foundation for Software Quality"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.206"},{"article-title":"Discovering statistics using SPSS","year":"2009","author":"field","key":"ref20"},{"article-title":"Research Methods Knowledge Base","year":"0","author":"trochim","key":"ref21"}],"event":{"name":"2014 IEEE Fourth International Workshop on Empirical Requirements Engineering (EmpiRE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,25]]}},"container-title":["2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883272\/6890105\/06890114.pdf?arnumber=6890114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:24:36Z","timestamp":1490297076000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/empire.2014.6890114","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}