{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:17Z","timestamp":1776782837626,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642001987","type":"print"},{"value":"9783642001994","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_11","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:36Z","timestamp":1238059596000},"page":"122-134","source":"Crossref","is-referenced-by-count":18,"title":["Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer"],"prefix":"10.1007","author":[{"given":"Laurie","family":"Williams","sequence":"first","affiliation":[]},{"given":"Michael","family":"Gegick","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Meneely","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/s766-002-8404-8","volume":"6","author":"I. Alexander","year":"2002","unstructured":"Alexander, I.: On Abstraction in Scenarios. Requirements Engineering\u00a06(4), 252\u2013255 (2002)","journal-title":"Requirements Engineering"},{"key":"11_CR2","volume-title":"Extreme Programming Explained: Embrace Change","author":"K. Beck","year":"2005","unstructured":"Beck, K.: Extreme Programming Explained: Embrace Change, 2nd edn. Addison-Wesley, Reading (2005)","edition":"2"},{"key":"11_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-51635-2_29","volume-title":"Software Risk Management","author":"B. Boehm","year":"1989","unstructured":"Boehm, B.: Software Risk Management. IEEE Computer Society Press, Washington (1989)"},{"issue":"1-4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1018991717352","volume":"10","author":"B. Boehm","year":"2000","unstructured":"Boehm, B., Abts, C., Chulani, S.: Software development cost estimation approaches \u2014 A survey. Annals of Software Engineering\u00a010(1-4), 177\u2013205 (2000)","journal-title":"Annals of Software Engineering"},{"key":"11_CR5","volume-title":"Software Engineering Economics","author":"B.W. Boehm","year":"1981","unstructured":"Boehm, B.W.: Software Engineering Economics. Prentice-Hall, Inc., Englewood Cliffs (1981)"},{"key":"11_CR6","volume-title":"Agile Software Development","author":"A. Cockburn","year":"2001","unstructured":"Cockburn, A.: Agile Software Development. Addison Wesley Longman, Reading (2001)"},{"key":"11_CR7","volume-title":"Agile Estimating and Planning","author":"M. Cohn","year":"2006","unstructured":"Cohn, M.: Agile Estimating and Planning. Prentice Hall, Upper Saddle River (2006)"},{"key":"11_CR8","unstructured":"Grenning, J.: Planning Poker or How to avoid analysis paralysis while release planning (2002) (accessed on February 26, 2008), \n                    \n                      https:\/\/segueuserfiles.middlebury.edu\/xp\/PlanningPoker-v1.pdf"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, U.G., Clarke, R.E.: Theory and Applications of the Delphi Technique: A bibliography (1975-1994). Technological Forecasting and Social Change 53, 185\u2013211 (1996)","DOI":"10.1016\/S0040-1625(96)00094-7"},{"key":"11_CR10","unstructured":"Haugen, N.C.: An empirical study of using planning poker for user story estimation, in Agile 2006, Minneapolis, MN, 9 pages (electronic proceedings) (2006)"},{"key":"11_CR11","volume-title":"Writing Secure Code","author":"M. Howard","year":"2003","unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code. Microsoft Press, Redmond (2003)"},{"key":"11_CR12","volume-title":"The Security Development Lifecycle","author":"M. Howard","year":"2006","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press, Redmond (2006)"},{"key":"11_CR13","unstructured":"Krsul, I.: Software Vulnerability Analysis, in Computer Science. vol. PhD West Lafayette: Purdue University (1998)"},{"key":"11_CR14","volume-title":"Building Secure Software","author":"G. McGraw","year":"2002","unstructured":"McGraw, G.: Building Secure Software. Addison Wesley, Boston (2002)"},{"key":"11_CR15","volume-title":"Software Security: Building Security","author":"G. McGraw","year":"2006","unstructured":"McGraw, G.: Software Security: Building Security. Addison-Wesley, Upper Saddle River (2006)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Mol\u00f8kken-\u00d8stvold, K., Haugen, N.C.: Combining Estimates with Planning Poker \u2013 An Empirical Study. In: Australian Software Engineering Conference (ASWEC 2007), Melbourne, Australia, pp. 349\u2013358 (2007)","DOI":"10.1109\/ASWEC.2007.15"},{"key":"11_CR17","volume-title":"Software Reliability Engineering: More Reliable Software Faster and Cheaper","author":"J.D. Musa","year":"2004","unstructured":"Musa, J.D.: Software Reliability Engineering: More Reliable Software Faster and Cheaper, 2nd edn. Authorhouse, Indiana (2004)","edition":"2"},{"key":"11_CR18","volume-title":"Educating the Net Generation","author":"D. Oblinger","year":"2005","unstructured":"Oblinger, D., Oblinger, J.: Educating the Net Generation. Educause, Boulder (2005)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: NIST Special Publication 800-30: Risk Management Guide for Information Technology Syste (July 2002)","DOI":"10.6028\/NIST.SP.800-30"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:21:29Z","timestamp":1580307689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}