{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:48:41Z","timestamp":1730220521274,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/espre.2014.6890522","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:52:33Z","timestamp":1410349953000},"page":"13-18","source":"Crossref","is-referenced-by-count":5,"title":["Towards a framework to measure security expertise in requirements analysis"],"prefix":"10.1109","author":[{"given":"Hanan","family":"Hibshi","sequence":"first","affiliation":[]},{"given":"Travis","family":"Breaux","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Riaz","sequence":"additional","affiliation":[]},{"given":"Laurie","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188366"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1083200.1083214"},{"key":"18","article-title":"The coding manual for qualitative researchers","author":"saldana","year":"2012","journal-title":"SAGE Pubs"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188415"},{"key":"16","first-page":"49","article-title":"From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering","volume":"3","author":"van lamsweerde","year":"2003","journal-title":"RHAS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0023-4"},{"journal-title":"HP Top Cyber Security Risks Report","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.09.061"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335668"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188392"},{"key":"20","article-title":"Capturing security requirements through misuse cases","author":"sindre","year":"2001","journal-title":"NIK 2001 Norsk Informatikkonferanse 2001"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.11.003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376742"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188403"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"5","article-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"corbin","year":"2007","journal-title":"SAGE Pubs"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1037\/h0026256"},{"key":"9","first-page":"97","article-title":"Design and evaluation for situation awareness enhancement","volume":"32","author":"endsley","year":"1988","journal-title":"HFES Annual Mtg"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1201\/9780203485088"}],"event":{"name":"2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,25]]}},"container-title":["2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883269\/6890516\/06890522.pdf?arnumber=6890522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:39:24Z","timestamp":1490276364000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890522\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/espre.2014.6890522","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}