{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:52:17Z","timestamp":1776365537011,"version":"3.51.2"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/chase.2019.00023","type":"proceedings-article","created":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T01:23:01Z","timestamp":1567128181000},"page":"61-68","source":"Crossref","is-referenced-by-count":19,"title":["\"Hopefully We Are Mostly Secure\": Views on Secure Code in Professional Practice"],"prefix":"10.1109","author":[{"given":"Tamara","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Helen","family":"Sharp","sequence":"additional","affiliation":[]},{"given":"Thein","family":"Tun","sequence":"additional","affiliation":[]},{"given":"Arosha","family":"Bandara","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Levine","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"anderson","year":"2008","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems"},{"key":"ref38","article-title":"How to improve the security skills of mobile app developers&#x0192; Comparing and contrasting expert views","author":"weir","year":"2016","journal-title":"Twelfth Symposium on Usable Privacy and Security ($ $SOUPS$ $ 2016)"},{"key":"ref33","first-page":"159","article-title":"Work , Ethnography and System Design","volume":"20","author":"anderson","year":"1997","journal-title":"The Encyclopedia of Microcomputers"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5465\/AME.1996.3145321"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4324\/9780203944769"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2519887"},{"key":"ref37","article-title":"Awareness is only the first step","author":"beyer","year":"2015","journal-title":"Hewlett Packard Business white paper Tech Rep"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70053-2"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-642-12575-1_4","article-title":"Three &#x0192;c&#x0192;s of agile practice: collaboration, coordination and communication","author":"sharp","year":"2010","journal-title":"Agile Software Development Current Research and Future Directions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref10","article-title":"Top Ten Project","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.09.004"},{"key":"ref12","article-title":"Motivation and satisfaction of software engineers","author":"fran\u00e7a","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/52.819967"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998191"},{"key":"ref28","author":"turkle","year":"2017","journal-title":"Alone Together Why We Expect More from Technology and Less from Each Other"},{"key":"ref4","author":"heath","year":"0","journal-title":"Should developers be sued for security holes&#x0192;"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7844-3_4"},{"key":"ref3","author":"neely","year":"2013","journal-title":"Who is Responsible for Application Security&#x0192; Development or Security&#x0192;"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.06.063"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.009"},{"key":"ref5","author":"shackleford","year":"0","journal-title":"A DevSecOps Playbook - SANS Institute"},{"key":"ref8","year":"0","journal-title":"Microsoft security development lifecycle"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.92"},{"key":"ref2","author":"gillis","year":"0","journal-title":"Developers Shouldn&#x2019;t Be Responsible For Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_29"},{"key":"ref1","author":"danhieux","year":"2018","journal-title":"Are Developers Your First Line of Security Risk or Defense&#x0192;"},{"key":"ref20","year":"0","journal-title":"The Security Mindset - Schneier on Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S0260210508008279"},{"key":"ref21","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-856x.2005.00204.x"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jss.2013.11.1097","article-title":"Guidelines for conducting and reporting case study research in software engineering","volume":"95","author":"wieringa","year":"2014","journal-title":"Journal of Systems and Software"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511491559"},{"key":"ref26","first-page":"48:1","article-title":"Measuring Human Values in Software Engineering","author":"winter","year":"2018","journal-title":"Proceedings of the 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement"},{"key":"ref25","year":"0","journal-title":"Ethics Don&#x2019;t be derailed by the trolley problem | Business | Subject areas | Publishing and editorial | BCS - The Chartered Institute for IT"}],"event":{"name":"2019 IEEE\/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)","location":"Montreal, QC, Canada","start":{"date-parts":[[2019,5,27]]},"end":{"date-parts":[[2019,5,27]]}},"container-title":["2019 IEEE\/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8807101\/8816863\/08816991.pdf?arnumber=8816991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T17:11:54Z","timestamp":1695143514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8816991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/chase.2019.00023","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}