{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:39:57Z","timestamp":1743071997302,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_61","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"697-702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vetting the Influence of ISO-9126 Software Characteristics in the Development of Mobile Applications"],"prefix":"10.1007","author":[{"given":"Pilita A.","family":"Amahan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"5","key":"61_CR1","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard J, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80(5):973\u2013993. https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005","journal-title":"J Comput Syst Sci"},{"key":"61_CR2","doi-asserted-by":"publisher","unstructured":"Sadeghi, A., Bagheri, H., Malek, S.: Analysis of android inter-app security vulnerabilities using COVERT. In: 37th IEEE International Conference on Software Engineering, pp. 725\u2013728. IEEE\/ACM, Florence (2015). doi: https:\/\/doi.org\/10.1109\/ICSE.2015.233","DOI":"10.1109\/ICSE.2015.233"},{"key":"61_CR3","unstructured":"Hoffer, J., George, J., Valacich, J.: Modern system analysis and design. 7th edn. Prentice Hall\/Pearson Education (2011)."},{"key":"61_CR4","doi-asserted-by":"publisher","unstructured":"Ogata, M., Franklin., J., Voas, J., Sritapan, V. Quirolgico, S.: Vetting the security of mobile applications. National Institute of Standards and Technology\/United States (2019). doi: https:\/\/doi.org\/10.6028\/NIST.SP.800-163rl","DOI":"10.6028\/NIST.SP.800-163rl"},{"key":"61_CR5","doi-asserted-by":"publisher","unstructured":"Tahar, A., Riyadh, HA., Sofyani, H., Purnomo.: Perceived ease of use, perceived usefulness, perceived security and intention to use e-filing: The role of technology readiness. The Journal of Asian, Finance, Economics, and Business 7(9), 537\u2013547. doi: https:\/\/doi.org\/10.13106\/jafeb.2020.vol7.no9.537","DOI":"10.13106\/jafeb.2020.vol7.no9.537"},{"key":"61_CR6","doi-asserted-by":"crossref","unstructured":"Goedicke, M., Bosch, J., Olsson, H.: Which factors influence practitioners\u2019 usage of build automation tools. In: 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE), pp. 1\u201320, IEEE\/Argentina (2017).","DOI":"10.1109\/RCoSE.2017.12"},{"key":"61_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10551-009-0247-1","volume":"94","author":"I Phau","year":"2010","unstructured":"Phau I, Ng J (2010) Predictors of usage intentions of pirated software. J Bus Ethics 94:23\u201337. https:\/\/doi.org\/10.1007\/s10551-009-0247-1","journal-title":"J Bus Ethics"},{"issue":"2","key":"61_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/pmj.20041","volume":"39","author":"A Ali","year":"2008","unstructured":"Ali A, Anbari F, Honey W (2008) Impact of organizational and project factors on acceptance and usage of project management software and perceived project success. J Bus Ethics 39(2):2\u20134. https:\/\/doi.org\/10.1002\/pmj.20041","journal-title":"J Bus Ethics"},{"issue":"8","key":"61_CR9","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.infsof.2004.10.004","volume":"47","author":"G Green","year":"2005","unstructured":"Green G, Hevner A, Collins R (2005) The impacts of quality and productivity perceptions on the use of software process improvement innovations. Inf Softw Technol 47(8):543\u2013553. https:\/\/doi.org\/10.1016\/j.infsof.2004.10.004","journal-title":"Inf Softw Technol"},{"issue":"3","key":"61_CR10","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/506724.506727","volume":"32","author":"M Chiasson","year":"2001","unstructured":"Chiasson M, Lovato C (2001) Factors influencing the formation of a user\u2019s perception and use of a DSS software innovation. ACM SIGMIS Database for Advances in Information Systems 32(3):16\u201335. https:\/\/doi.org\/10.1145\/506724.506727","journal-title":"ACM SIGMIS Database for Advances in Information Systems"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T17:03:29Z","timestamp":1644339809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_61","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}