{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:29:11Z","timestamp":1766492951747,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031297854"},{"type":"electronic","value":"9783031297861"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-29786-1_5","type":"book-chapter","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T12:31:25Z","timestamp":1680525085000},"page":"65-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding the\u00a0Role of\u00a0Human-Related Factors in\u00a0Security Requirements Elicitation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4706-0134","authenticated-orcid":false,"given":"Sanaa","family":"Alwidian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,4]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102003","volume":"98","author":"M Alshaikh","year":"2020","unstructured":"Alshaikh, M.: Developing cybersecurity culture to influence employee behavior: A practice perspective. Comput. Secur. 98, 102003 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Alwidian, S.: Towards integrating human-centric characteristics into the goal-oriented requirements language. In: 12th Model-Driven Requirements Engineering Workshop (2022). (To Appear)","DOI":"10.1109\/REW56159.2022.00045"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1177\/1088868306294907","volume":"11","author":"MC Ashton","year":"2007","unstructured":"Ashton, M.C., Lee, K.: Empirical, theoretical, and practical advantages of the HEXACO model of personality structure. Personal. Soc. Psychol. Rev. 11(2), 150\u2013166 (2007)","journal-title":"Personal. Soc. Psychol. Rev."},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jss.2017.06.072","volume":"132","author":"S Astromskis","year":"2017","unstructured":"Astromskis, S., Bavota, G., Janes, A., Russo, B., Di Penta, M.: Patterns of developers behaviour: A 1000-hour industrial study. J. Syst. Softw. 132, 85\u201397 (2017)","journal-title":"J. Syst. Softw."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bowen, B.M., Devarajan, R., Stolfo, S.: Measuring the human factor of cyber security. In: 2011 IEEE International Conference on Technologies for Homeland Security, pp. 230\u2013235 (2011)","DOI":"10.1109\/THS.2011.6107876"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Brust-Renck, P.G., Weldon, R.B., Reyna, V.F.: Judgment and decision making. Oxford Research Encyclopedia of Psychology (2021)","DOI":"10.1093\/acrefore\/9780190236557.013.536"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Compagna, L., Khoury, P.E., Massacci, F., Thomas, R., Zannone, N.: How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach. In: 11th International Conference on Artificial Intelligence and Law, pp. 149\u2013153. ACM (2007)","DOI":"10.1145\/1276318.1276346"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jarmac.2015.09.001","volume":"4","author":"JC Corbin","year":"2015","unstructured":"Corbin, J.C., Reyna, V.F., Weldon, R.B., Brainerd, C.J.: How reasoning, judgment, and decision making are colored by gist-based intuition: A fuzzy-trace theory approach. J. Appl. Res. Memory Cognit. 4(4), 344\u2013355 (2015)","journal-title":"J. Appl. Res. Memory Cognit."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.jss.2016.11.024","volume":"124","author":"L Gren","year":"2017","unstructured":"Gren, L., Torkar, R., Feldt, R.: Group development and group maturity when building agile teams: A qualitative and quantitative investigation at eight large companies. J. Syst. Softw. 124, 104\u2013119 (2017)","journal-title":"J. Syst. Softw."},{"key":"5_CR10","unstructured":"Ion, I., Reeder, R., Consolvo, S.: \u201c...No one can hack my mind\u201d: Comparing expert and non-expert security practices. In: 11th USENIX Conference on Usable Privacy and Security, pp. 327\u2013346. USENIX Association (2015)"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/0092-6566(74)90057-9","volume":"7","author":"JJ Jaccard","year":"1974","unstructured":"Jaccard, J.J.: Predicting social behavior from personality traits. J. Res. Personal. 7(4), 358\u2013367 (1974)","journal-title":"J. Res. Personal."},{"key":"5_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-030-52243-8_37","volume-title":"Intelligent Computing","author":"J Jaskolka","year":"2020","unstructured":"Jaskolka, J.: Recommendations for effective security assurance of software-dependent systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1230, pp. 511\u2013531. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52243-8_37"},{"key":"5_CR13","unstructured":"John, O.P., Srivastava, S.: The big five trait taxonomy: History, measurement, and theoretical perspectives, pp. 102\u2013138. Guilford Press (1999)"},{"issue":"4","key":"5_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.cose.2006.02.008","volume":"25","author":"H Kruger","year":"2006","unstructured":"Kruger, H., Kearney, W.: A prototype for assessing information security awareness. Comput. Secur. 25(4), 289\u2013296 (2006)","journal-title":"Comput. Secur."},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1037\/0022-3514.52.3.596","volume":"52","author":"PA Rippetoe","year":"1987","unstructured":"Rippetoe, P.A., Rogers, R.W.: Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. J. Personal. Soc. Psychol. 52(3), 596\u2013604 (1987)","journal-title":"J. Personal. Soc. Psychol."},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1), 93 (1975)","journal-title":"J. Psychol."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Samuel, J., Jaskolka, J., Yee, G.: Analyzing structural security posture to evaluate system design decisions. In: 21st IEEE International Conference on Software Quality, Reliability, and Security, pp. 8\u201317 (2021)","DOI":"10.1109\/QRS54544.2021.00012"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Wang, S., Nagappan, N.: Characterizing and understanding software developer networks in security development. In: 32nd International Symposium on Software Reliability Engineering, pp. 534\u2013545 (2021)","DOI":"10.1109\/ISSRE52982.2021.00061"},{"key":"5_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101640","volume":"88","author":"A Wiley","year":"2020","unstructured":"Wiley, A., McCormac, A., Calic, D.: More than the individual: Examining the relationship between culture and information security awareness. Comput. Secur. 88, 101640 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR20","unstructured":"Woon, I.M.Y., Tan, G.W., Low, R.: A protection motivation theory approach to home wireless security. In: 2005 International Conference on Information Systems (2005)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-29786-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:36:20Z","timestamp":1710358580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-29786-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031297854","9783031297861"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-29786-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"4 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}