{"id":"https://openalex.org/W2063585450","doi":"https://doi.org/10.1109/espre.2014.6890522","title":"Towards a framework to measure security expertise in requirements analysis","display_name":"Towards a framework to measure security expertise in requirements analysis","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2063585450","doi":"https://doi.org/10.1109/espre.2014.6890522","mag":"2063585450"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/espre.2014.6890522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/records/1268096/files/article.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007316441","display_name":"Hanan Hibshi","orcid":"https://orcid.org/0000-0003-0250-3616"},"institutions":[{"id":"https://openalex.org/I4210111472","display_name":"King Abdul Aziz University Hospital","ror":"https://ror.org/01vv03303","country_code":"SA","type":"healthcare","lineage":["https://openalex.org/I4210111472"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hanan Hibshi","raw_affiliation_strings":["College of Computing, King Abdul-Aziz University, Jeddah, Saudi Arabia","Institute for Software Research, Carnegie Mellon Univeristy, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Software Research, Carnegie Mellon Univeristy, Pittsburgh, Pennsylvania, USA","institution_ids":[]},{"raw_affiliation_string":"College of Computing, King Abdul-Aziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210111472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006266551","display_name":"Travis D. Breaux","orcid":"https://orcid.org/0000-0001-7127-8155"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis Breaux","raw_affiliation_strings":["Institute for Software Research, Carnegie Mellon Univeristy, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Software Research, Carnegie Mellon Univeristy, Pittsburgh, Pennsylvania, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111581160","display_name":"Maria Riaz","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maria Riaz","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028171895","display_name":"Laurie Williams","orcid":"https://orcid.org/0000-0003-3300-6540"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurie Williams","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, North Carolina, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.102,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":5,"citation_normalized_percentile":{"value":0.903252,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"3","issue":null,"first_page":"13","last_page":"18"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security Awareness","score":0.45412958}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6754371},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.641759},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.5642837},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5381881},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.52617514},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.45942003},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.45412958},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.43396273},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.36875415},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3022527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28366435},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.18550503},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10450944},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/espre.2014.6890522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://zenodo.org/record/1268096","pdf_url":"https://zenodo.org/records/1268096/files/article.pdf","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":["European Organization for Nuclear Research"],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Towards_a_Framework_to_Measure_Security_Expertise_in_Requirements_Analysis/6626273","pdf_url":"https://figshare.com/articles/journal_contribution/Towards_a_Framework_to_Measure_Security_Expertise_in_Requirements_Analysis/6626273/1/files/12123818.pdf","source":{"id":"https://openalex.org/S4306400572","display_name":"OPAL (Open@LaTrobe) (La Trobe University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I196829312","host_organization_name":"La Trobe University","host_organization_lineage":["https://openalex.org/I196829312"],"host_organization_lineage_names":["La Trobe University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://zenodo.org/record/1268096","pdf_url":"https://zenodo.org/records/1268096/files/article.pdf","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":["European Organization for Nuclear Research"],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.78,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1544152542","https://openalex.org/W1570321471","https://openalex.org/W1658908529","https://openalex.org/W1662441884","https://openalex.org/W1803273808","https://openalex.org/W1874464064","https://openalex.org/W1966182711","https://openalex.org/W2037789405","https://openalex.org/W2038048606","https://openalex.org/W2055095549","https://openalex.org/W2064647596","https://openalex.org/W2067570705","https://openalex.org/W2074409795","https://openalex.org/W2138362482","https://openalex.org/W2142515939","https://openalex.org/W2146863076","https://openalex.org/W2146948159","https://openalex.org/W2150071393","https://openalex.org/W2738487222","https://openalex.org/W3022452870","https://openalex.org/W4238040396","https://openalex.org/W4245671666","https://openalex.org/W4281564584"],"related_works":["https://openalex.org/W4292814261","https://openalex.org/W4291197340","https://openalex.org/W4253611616","https://openalex.org/W3152487049","https://openalex.org/W3143558183","https://openalex.org/W2472769502","https://openalex.org/W2402056828","https://openalex.org/W2242308721","https://openalex.org/W2181998829","https://openalex.org/W2097950940"],"abstract_inverted_index":{"Research":[0],"shows":[1],"that":[2,102,121,126,166],"commonly":[3],"accepted":[4],"security":[5,19,30,53,58,173],"requirements":[6,17,59,81,143,174],"are":[7],"not":[8],"generally":[9],"applied":[10],"in":[11,147,157,185],"practice.":[12],"Instead":[13],"of":[14,45,52,68,86,117],"relying":[15],"on":[16,22],"checklists,":[18],"experts":[20,54,151,178],"rely":[21],"their":[23,145,172,186],"expertise":[24],"and":[25,39,55,72,77,109,133,144],"background":[26],"knowledge":[27],"to":[28,47,64,78,83,140,149,154,162,170],"identify":[29],"vulnerabilities.":[31,88],"To":[32],"understand":[33],"the":[34,49],"gap":[35],"between":[36],"available":[37],"checklists":[38],"practice,":[40],"we":[41,103],"conducted":[42],"a":[43,80,164],"series":[44],"interviews":[46,120],"encode":[48],"decision-making":[50,124,187],"process":[51],"novices":[56],"during":[57],"analysis.":[60,111],"Participants":[61],"were":[62],"asked":[63],"analyze":[65],"two":[66,119],"types":[67],"artifacts:":[69],"source":[70],"code,":[71],"network":[73],"diagrams":[74],"for":[75],"vulnerabilities":[76],"apply":[79],"checklist":[82],"mitigate":[84],"some":[85],"those":[87],"We":[89,112],"framed":[90],"our":[91,114],"study":[92],"using":[93,106],"Situation":[94],"Awareness-a":[95],"cognitive":[96],"theory":[97,108],"from":[98],"psychology-to":[99],"elicit":[100],"responses":[101],"later":[104],"analyzed":[105],"coding":[107],"grounded":[110],"report":[113],"preliminary":[115],"results":[116],"analyzing":[118],"reveal":[122],"possible":[123],"patterns":[125],"could":[127],"characterize":[128],"how":[129,150,177],"analysts":[130],"perceive,":[131],"comprehend":[132],"project":[134],"future":[135],"threats":[136],"which":[137],"leads":[138],"them":[139],"decide":[141],"upon":[142],"specifications,":[146],"addition,":[148],"use":[152,169],"assumptions":[153],"overcome":[155],"ambiguity":[156],"specifications.":[158],"Our":[159],"goal":[160],"is":[161],"build":[163],"model":[165],"researchers":[167],"can":[168],"evaluate":[171],"methods":[175],"against":[176],"transition":[179],"through":[180],"different":[181],"situation":[182],"awareness":[183],"levels":[184],"process.":[188]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2063585450","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2024-12-11T09:36:06.980373","created_date":"2016-06-24"}