{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:43:18Z","timestamp":1730292198641,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/re.2015.7320417","type":"proceedings-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T22:57:15Z","timestamp":1446764235000},"page":"146-155","source":"Crossref","is-referenced-by-count":7,"title":["Assessment of risk perception in security requirements composition"],"prefix":"10.1109","author":[{"given":"Hanan","family":"Hibshi","sequence":"first","affiliation":[]},{"given":"Travis D.","family":"Breaux","sequence":"additional","affiliation":[]},{"given":"Stephen B.","family":"Broomell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.46"},{"journal-title":"Theoretical Sensitivity Advances in the Methodology of Grounded Theory","year":"1978","author":"glaser","key":"ref11"},{"key":"ref12","article-title":"Defense in depth","author":"mcguiness","year":"2001","journal-title":"SANSO"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ESPRE.2014.6890522"},{"key":"ref14","article-title":"Discovering Decision-Making Patterns for Security Novices and Experts","author":"hibshi","year":"2015","journal-title":"Inst for Softw Research Carnegie Mellon Univ Pittsburgh PA Tech Rep CMU-ISR-15–101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335668"},{"article-title":"SSL vs. TLS: The Future of Data Encryption","year":"0","author":"honorof","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24006-3_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0049124105283121"},{"year":"0","key":"ref19","article-title":"NIST\/ITL Special Publication (800)"},{"journal-title":"Statistical Power Analysis for the Behavioral Sciences","year":"1988","author":"cohen","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636717"},{"journal-title":"lme4 Linear mixed-effects models using Eigen and S4","year":"2014","author":"bates","key":"ref3"},{"article-title":"SSL is dead, long live TLS - The Akamai Blog","year":"0","author":"ellis","key":"ref6"},{"key":"ref5","first-page":"201","article-title":"A Probabilistic Framework for Goal-Oriented Risk Analysis","author":"cailliau","year":"2014","journal-title":"IEEE Int'l Conf Req'ts Engr"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051659"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193146"},{"key":"ref2","volume":"175","author":"auspurg","year":"2014","journal-title":"Factorial Survey Experiments"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790942"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1086\/268432"},{"journal-title":"OWASP","article-title":"OWASP Top Ten Project - OWASP","year":"0","key":"ref20"},{"journal-title":"Measuring social judgments The factorial survey approach","year":"1982","author":"rossi","key":"ref22"},{"journal-title":"R Core Team R A language and environment for statistical computing","year":"2013","key":"ref21"},{"journal-title":"Experimental and Quasi-Experimental Designs for Generalized Causal Inference","year":"2002","author":"shadish","key":"ref24"},{"journal-title":"The Coding Manual for Qualitative Researchers","year":"2012","author":"salda\u00f1a","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2009.03.004"},{"journal-title":"US-CERT","article-title":"OpenSSL ‘Heartbleed’ vulnerability (CVE-2014–0160)|US-CERT","year":"0","key":"ref25"}],"event":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2015,8,24]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 IEEE 23rd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310793\/7320393\/07320417.pdf?arnumber=7320417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T02:37:00Z","timestamp":1490409420000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7320417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/re.2015.7320417","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}