{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:50:10Z","timestamp":1743108610367,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_31","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:22:53Z","timestamp":1309220573000},"page":"346-360","source":"Crossref","is-referenced-by-count":0,"title":["User Acceptance for Extended Function Point Analysis in Software Security Costing"],"prefix":"10.1007","author":[{"given":"Nur Atiqah","family":"Sia Abdullah","sequence":"first","affiliation":[]},{"given":"Rusli","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Mohd Hasan","family":"Selamat","sequence":"additional","affiliation":[]},{"given":"Azmi","family":"Jaafar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Albrecht, A.J.: Measuring Application Development Productivity. In: Proceedings of IBM Application Development Symposium, pp. 83\u201392 (1979)"},{"key":"31_CR2","unstructured":"Come back function point analysis (modernised) all is forgiven, http:\/\/www.measuresw.com"},{"key":"31_CR3","volume-title":"Estimating Software Costs","author":"T.C. Jones","year":"1998","unstructured":"Jones, T.C.: Estimating Software Costs. McGraw-Hill, United States of America (1998)"},{"key":"31_CR4","series-title":"Wiley Series in Software Engineering","volume-title":"Software Sizing and Estimating \u2013 Mark II FPA","author":"C. Symons","year":"1991","unstructured":"Symons, C.: Software Sizing and Estimating \u2013 Mark II FPA. Wiley Series in Software Engineering. Wiley, United Kingdom (1991)"},{"key":"31_CR5","unstructured":"Whitmire, S. A.: 3D Function Points: Specific and Real-Time Extensions of Function Points. In: Proceedings of the Pacific Northwest Software Quality Conference (1992)"},{"key":"31_CR6","unstructured":"Pierre, D., St., M.M., Abran, A., Desharnais, J.M., Bourque, P.: Full Function Points: Counting Practices Manual. Software Engineering Management Research Laboratory and Software Engineering Laboratory in Applied Metrics Technical Report 1997-04 (1997)"},{"key":"31_CR7","unstructured":"Symons, C., Lesterhuis, A.: The COSMIC Functional Size Measurement Method Version 3.0.1 \u2013 Measurement Manual. Common Software Measurement International Consortium: United Kingdom (2009)"},{"issue":"6","key":"31_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/777313.777327","volume":"46","author":"R.T. Mercuri","year":"2003","unstructured":"Mercuri, R.T.: Analyzing Security Cost. Communications of the ACM\u00a046(6), 15\u201318 (2003)","journal-title":"Communications of the ACM"},{"key":"31_CR9","unstructured":"McGraw, G., Routh, J.: Software in Security: Measuring Software Security. InformIT (2009)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Jari, R.: Contracting over the Quality Aspect of Security in Software Product Markets. In: Proc. of 2nd ACM workshop on Quality of Protection, pp. 19\u201326 (2006)","DOI":"10.1145\/1179494.1179499"},{"key":"31_CR11","unstructured":"Boehm, B. W., Abts, C., Brown, A.W., Chulani, S., Clark, B.K., Horowitz, E., Modachy, R., Reifer, D., Steece, B.: Software Cost Estimation with COCOMO II. Prentice Hall, Inc., New Jersey (2000)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Reifer, D.J., Boehm, B.W., Gangadharan, M.: Estimating the cost of Security for COTS Software. Technical Report USC-CSE-2003-502 (2003)","DOI":"10.1007\/3-540-36465-X_17"},{"key":"31_CR13","unstructured":"Colbert, E., Wu, D., Chen, Y., Boehm, B.: Cost Estimation for Secure Software and Systems 2006 Project Update. University of Southern California, Center of Software Engineering, United States of America (2006)"},{"key":"31_CR14","unstructured":"Colbert, E., Boehm, B.: Cost Estimation for Secure Software & Systems. Paper presented at the ISPA\/SCEA 2008 Joint International Conference, The Netherlands (2008)"},{"key":"31_CR15","volume-title":"Proceedings of Software Process Workshop on Software Process Simulation, Center for Software Engineering","author":"D. Wu","year":"2006","unstructured":"Wu, D., Yang, Y.: Towards an Approach for Security Risk Analysis in COTS Based Development. In: Proceedings of Software Process Workshop on Software Process Simulation, Center for Software Engineering. University of Southern California, Los Angeles (2006)"},{"key":"31_CR16","volume-title":"Proceedings of the International Symposium on Information Technology (ITSim 2008)","author":"N.A.S. Abdullah","year":"2008","unstructured":"Abdullah, N.A.S., Selamat, M.H., Abdullah, R., Jaafar, A.: Potential Security Factors in Software Cost Estimation. In: Proceedings of the International Symposium on Information Technology (ITSim 2008), vol.\u00a03. IEEE, Kuala Lumpur (2008)"},{"key":"31_CR17","volume-title":"Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","author":"N.A.S. Abdullah","year":"2009","unstructured":"Abdullah, N.A.S., Selamat, M.H., Abdullah, R., Jaafar, A.: Software Security Characteristics for Function Point Analysis. In: Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, Hong Kong (2009)"},{"key":"31_CR18","volume-title":"Proceedings of the Malaysian Software Engineering Conference (MySEC 2008)","author":"N.A.S. Abdullah","year":"2008","unstructured":"Abdullah, N.A.S., Selamat, M.H., Abdullah, R., Jaafar, A.: Security Risks Formulation in Software Cost Estimation. In: Proceedings of the Malaysian Software Engineering Conference (MySEC 2008). IEEE, Terengganu (2008)"},{"key":"31_CR19","unstructured":"Davis, J.: Internet Banking. Paper presented at the I-Hack. University of Technology MARA, Malaysia (2007)"},{"key":"31_CR20","series-title":"Addison-Wesley Software Security Series","volume-title":"Software Security: Building Security","author":"G. McGraw","year":"2006","unstructured":"McGraw, G.: Software Security: Building Security, United States of America. Addison-Wesley Software Security Series. Pearson Education Inc., London (2006)"},{"key":"31_CR21","unstructured":"Department of Education, Information Technology Security: Information Technology Security Cost Estimation Guide (2002)"},{"key":"31_CR22","unstructured":"CCRA Working Group: Common Criteria for Information Technology Security Evaluation Version 3.1 (2009)"},{"key":"31_CR23","unstructured":"Wiesmann, A., Stock, A., Curphey, M., Stirbei, R.: A Guide to Building Secure Web and Web Services. In: Black Hat 2nd Edition; The Open Web Application Security Project (2005)"},{"key":"31_CR24","unstructured":"IT Governance Institute: Control Objectives for Information and related Technology (COBIT 4.1): Framework, Control Objectives, Management Guidelines, and Maturity Models (2007)"},{"issue":"1","key":"31_CR25","first-page":"183","volume":"1","author":"N.A.S. Abdullah","year":"2009","unstructured":"Abdullah, N.A.S., Abdullah, R., Selamat, M.H., Jaafar, A., Jusoff, K.: Estimating Software Cost with Security Risk Potential. International Journal of Economics and Finance, Canadian Center of Science and Education\u00a01(1), 183\u2013192 (2009)","journal-title":"International Journal of Economics and Finance, Canadian Center of Science and Education"},{"key":"31_CR26","volume-title":"Applying the Rasch Model: fundamental measurement in the Human Sciences","author":"T.G. Bond","year":"2007","unstructured":"Bond, T.G., Fox, C.M.: Applying the Rasch Model: fundamental measurement in the Human Sciences, 2nd edn. Lawrence Erlbaum Associates, Inc., New Jersey (2007)","edition":"2"},{"key":"31_CR27","unstructured":"Abdullah, N. A. S., Selamat, M. H., Abdullah, R., Jaafar, A.: Validation of Security Awareness in Software Development by using RASCH Measurement. Paper presented in the Pacific Rim Objective Measurement Symposium, Hong Kong (2009)"},{"key":"31_CR28","volume-title":"Proceedings of the International Symposium on Information Technology (ITSim),","author":"N.A.S. Abdullah","year":"2010","unstructured":"Abdullah, N.A.S., Selamat, M.H., Abdullah, R., Jaafar, A.: Extended Function Point Analysis Prototype - With Security Costing Estimation. In: Proceedings of the International Symposium on Information Technology (ITSim), Kuala Lumpur, Malaysia, June 15- 17, IEEE, Malaysia (2010)"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Davis, F.D.: Perceived Usefulness. Perceived Ease of Use and User Acceptance of Information Technology. MIS Quarterly\u00a013(3) (1989)","DOI":"10.2307\/249008"},{"key":"31_CR30","unstructured":"Fishbein, M., Ajzen, I.: Beliefs, Attitude, Intention and Behavior. An Introduction to Theory and Research, Reading, MA (1995)"},{"key":"31_CR31","unstructured":"Moody, D.L.: The Method Evaluation Model: A Theoretical Model for Validating Information Systems Design Methods. Unpublished paper in School of Business Systems, Monash University, Melbourne, Australia (2003)"},{"key":"31_CR32","volume-title":"The Primacy of Practice","author":"N. Rescher","year":"1973","unstructured":"Rescher, N.: The Primacy of Practice. Basil Blackwel, Oxford (1973)"},{"key":"31_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/3-540-45816-6_25","volume-title":"Conceptual Modeling - ER 2002","author":"D.L. Moody","year":"2002","unstructured":"Moody, D.L.: Comparative evaluation of large data model representation methods: The analyst\u2019s perspective. In: Spaccapietra, S., March, S.T., Kambayashi, Y. (eds.) ER 2002. LNCS, vol.\u00a02503, p. 214. Springer, Heidelberg (2002)"},{"key":"31_CR34","unstructured":"ISO\/IEC 14143-3-Information technology-Software measurement-Functional size measurement-Part 3: Verification of functional sizemeasurement methods (2003)"},{"key":"31_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C. Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"31_CR36","unstructured":"Abrahao, S., Poels, G., Pastor, O.: Assessing the Accuracy and Reproducibility of FSM Methods through Experimentation. In: 3rd International ACM-IEEE International Symposium on Empirical Software Engineering (ISESE 2004), Redondo Beach CA, USA (August 2004); ISBN 0-7695-2165-7"},{"key":"31_CR37","volume-title":"Practical Research: Planning and design","author":"P.D. Leedy","year":"2005","unstructured":"Leedy, P.D., Ormrod, J.E.: Practical Research: Planning and design, 8th edn. Pearson Educational International and Prentice Hall, New Jersey (2005)","edition":"8"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:24:26Z","timestamp":1741289066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}