{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:52:27Z","timestamp":1743083547820,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031830716"},{"type":"electronic","value":"9783031830723"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-83072-3_1","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T18:59:18Z","timestamp":1741805958000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Work in\u00a0Progress: Considering Human Factors in\u00a0Collaborative Decision Making for\u00a0Secure Architecture Design"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-3916","authenticated-orcid":false,"given":"Brahim","family":"Hamid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, A., Rahman, A., Krishna, R., Sobran, A., Menzies, T.: We don\u2019t need another hero?: the impact of \u201cheroes\u201d on software development. In: Paulisch, F., Bosch, J. (eds.) ICSE (SEIP), pp. 245\u2013253. ACM (2018)","DOI":"10.1145\/3183519.3183549"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"102003","DOI":"10.1016\/j.cose.2020.102003","volume":"98","author":"M Alshaikh","year":"2020","unstructured":"Alshaikh, M.: Developing cybersecurity culture to influence employee behavior: a practice perspective. Comput. Secur. 98, 102003 (2020)","journal-title":"Comput. Secur."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jss.2017.06.072","volume":"132","author":"S Astromskis","year":"2017","unstructured":"Astromskis, S., Bavota, G., Janes, A., Russo, B., Di Penta, M.: Patterns of developers behaviour: a 1000-hour industrial study. J. Syst. Softw. 132, 85\u201397 (2017)","journal-title":"J. Syst. Softw."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bowen, B.M., Devarajan, R., Stolfo, S.: Measuring the human factor of cyber security. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 230\u2013235 (2011)","DOI":"10.1109\/THS.2011.6107876"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Brust-Renck, P.G., Weldon, R.B., Reyna, V.F.: Judgment and decision making. Oxf. Res. Encycl. Psychol. (2021)","DOI":"10.1093\/acrefore\/9780190236557.013.536"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Compagna, L., Khoury, P.E., Massacci, F., Thomas, R., Zannone, N.: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In: 11th International Conference on Artificial Intelligence and Law, ICAIL 2007, pp. 149\u2013153. ACM, New York (2007)","DOI":"10.1145\/1276318.1276346"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jarmac.2015.09.001","volume":"4","author":"JC Corbin","year":"2015","unstructured":"Corbin, J.C., Reyna, V.F., Weldon, R.B., Brainerd, C.J.: How reasoning, judgment, and decision making are colored by gist-based intuition: a fuzzy-trace theory approach. J. Appl. Res. Mem. Cogn. 4(4), 344\u2013355 (2015)","journal-title":"J. Appl. Res. Mem. Cogn."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dasanayake, S., Markkula, J., Aaramaa, S., Oivo, M.: Software architecture decision-making practices and challenges: an industrial case study. In: 2015 24th Australasian Software Engineering Conference, pp. 88\u201397 (2015)","DOI":"10.1109\/ASWEC.2015.20"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Falessi, D., Cantone, G., Kazman, R., Kruchten, P.: Decision-making techniques for software architecture design: a comparative survey. ACM Comput. Surv. 43(4) (2011)","DOI":"10.1145\/1978802.1978812"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jss.2015.01.056","volume":"103","author":"P Gaubatz","year":"2015","unstructured":"Gaubatz, P., Lytra, I., Zdun, U.: Automatic enforcement of constraints in real-time collaborative architectural decision making. J. Syst. Softw. 103, 128\u2013149 (2015)","journal-title":"J. Syst. Softw."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.cose.2018.03.016","volume":"77","author":"B Hamid","year":"2018","unstructured":"Hamid, B., Weber, D.: Engineering secure systems: models, patterns and empirical validation. Comput. Secur. 77, 315\u2013348 (2018)","journal-title":"Comput. Secur."},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1002\/sys.20093","volume":"11","author":"HAH Handley","year":"2008","unstructured":"Handley, H.A.H., Smillie, R.J.: Architecture framework human view: the NATO approach. Syst. Eng. 11(2), 156\u2013164 (2008)","journal-title":"Syst. Eng."},{"key":"1_CR13","unstructured":"Ion, I., Reeder, R., Consolvo, S.: \u201c...No one can hack my mind\u201d: comparing expert and non-expert security practices. In: 11th USENIX Conference on Usable Privacy and Security, SOUPS 2015, pp. 327\u2013346. USENIX Association, USA (2015)"},{"key":"1_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-030-52243-8_37","volume-title":"Intelligent Computing","author":"J Jaskolka","year":"2020","unstructured":"Jaskolka, J.: Recommendations for effective security assurance of software-dependent systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2020. AISC, vol. 1230, pp. 511\u2013531. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52243-8_37"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Jasser, S.: Enforcing architectural security decisions. In: 2020 IEEE International Conference on Software Architecture (ICSA), pp. 35\u201345 (2020)","DOI":"10.1109\/ICSA47634.2020.00012"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Joblin, M., Apel, S., Hunsen, C., Mauerer, W.: Classifying developers into core and peripheral: an empirical study on count and network metrics. In: 39th International Conference on Software Engineering, pp. 164\u2013174. IEEE\/ACM (2017)","DOI":"10.1109\/ICSE.2017.23"},{"key":"1_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-319-19243-7_33","volume-title":"Advanced Information Systems Engineering Workshops","author":"D Jugel","year":"2015","unstructured":"Jugel, D., Schweda, C.M., Zimmermann, A.: Modeling decisions for collaborative enterprise architecture engineering. In: Persson, A., Stirna, J. (eds.) CAiSE 2015. LNBIP, vol. 215, pp. 351\u2013362. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19243-7_33"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Kaur, J., Mustafa, N.: Examining the effects of knowledge, attitude and behaviour on information security awareness: a case on SME. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 286\u2013290 (2013)","DOI":"10.1109\/ICRIIS.2013.6716723"},{"key":"1_CR19","unstructured":"Nowak, M.: Collaborative software architecture decisions: structure and dynamics. Ph.D. thesis, USI Faciulty fo Informatics (2014)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-39031-9_13","volume-title":"Software Architecture","author":"M Nowak","year":"2013","unstructured":"Nowak, M., Pautasso, C.: Team situational awareness and architectural decision making with the software architecture warehouse. In: Drira, K. (ed.) ECSA 2013. LNCS, vol. 7957, pp. 146\u2013161. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39031-9_13"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Nowak, M., Pautasso, C., Zimmermann, O.: Architectural decision modeling with reuse: challenges and opportunities. In: 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, SHARK 2010, pp. 13\u201320. ACM, New York (2010)","DOI":"10.1145\/1833335.1833338"},{"key":"1_CR22","unstructured":"OWASP: Threat modeling process (2020). https:\/\/owasp.org\/www-community\/Threat_Modeling_Process. Accessed June 2022"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Oyetoyan, T.D., Jaatun, M.G.G., Cruzes, D.S.: Measuring developers\u2019 software security skills, usage, and training needs. In: Exploring Security in Software Architecture and Design. IGI Global (2019)","DOI":"10.4018\/978-1-5225-6313-6.ch011"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"102073","DOI":"10.1016\/j.sysarc.2021.102073","volume":"117","author":"Q Rouland","year":"2021","unstructured":"Rouland, Q., Hamid, B., Jaskolka, J.: Specification, detection, and treatment of STRIDE threats for software components: modeling, formal methods, and tool support. J. Syst. Architect. 117, 102073 (2021)","journal-title":"J. Syst. Architect."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Rouland, Q., Hamid, B., Bodeveix, J.P., Filali, M.: A formal methods approach to security requirements specification and verification. In: 24th International Conference on Engineering of Complex Computer Systems, pp. 236\u2013241. ICECCS 2019 (2019)","DOI":"10.1109\/ICECCS.2019.00033"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2020.02.033","volume":"108","author":"Q Rouland","year":"2020","unstructured":"Rouland, Q., Hamid, B., Jaskolka, J.: Formal specification and verification of reusable communication models for distributed systems architecture. Futur. Gener. Comput. Syst. 108, 178\u2013197 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"8","key":"1_CR27","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.infsof.2014.03.009","volume":"56","author":"D Tofan","year":"2014","unstructured":"Tofan, D., Galster, M., Avgeriou, P., Schuitema, W.: Past and future of software architectural decisions - a systematic mapping study. Inf. Softw. Technol. 56(8), 850\u2013872 (2014)","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"1_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MS.2005.27","volume":"22","author":"J Tyree","year":"2005","unstructured":"Tyree, J., Akerman, A.: Architecture decisions: demystifying architecture. IEEE Softw. 22(2), 19\u201327 (2005)","journal-title":"IEEE Softw."},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Wang, S., Nagappan, N.: Characterizing and understanding software developer networks in security development. In: 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), pp. 534\u2013545 (2021)","DOI":"10.1109\/ISSRE52982.2021.00061"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"101640","DOI":"10.1016\/j.cose.2019.101640","volume":"88","author":"A Wiley","year":"2020","unstructured":"Wiley, A., McCormac, A., Calic, D.: More than the individual: examining the relationship between culture and information security awareness. Comput. Secur. 88, 101640 (2020)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-83072-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T18:59:24Z","timestamp":1741805964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-83072-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031830716","9783031830723"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-83072-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 external reviewers involved (outside the PC)","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}