{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:20:05Z","timestamp":1730211605429,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,20]]},"DOI":"10.1109\/csndsp54353.2022.9907931","type":"proceedings-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T19:41:19Z","timestamp":1665085279000},"page":"356-361","source":"Crossref","is-referenced-by-count":2,"title":["Security-Focused Prototyping: A Natural Precursor to Secure Development"],"prefix":"10.1109","author":[{"given":"Sam","family":"Attwood","sequence":"first","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom"}]},{"given":"Nana","family":"Onumah","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom"}]},{"given":"Katie","family":"Paxton-Fear","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom"}]},{"given":"Rupak","family":"Kharel","sequence":"additional","affiliation":[{"name":"University of Central Lancashire,School of Psychology and Computer Science,Preston,United Kingdom"}]}],"member":"263","reference":[{"key":"ref31","article-title":"Case study research: Design and methods, applied social research","volume":"5","author":"yin","year":"1994","journal-title":"Methodos Series"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2011.06.005"},{"year":"2002","key":"ref10","article-title":"Bill gates: Trustworthy computing"},{"journal-title":"Tech Rep","article-title":"Secure software lifecycle knowledge area","year":"2019","key":"ref11"},{"year":"2021","key":"ref12","article-title":"What are the micrsoft sdl practices?"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281254"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.43"},{"year":"21","key":"ref16","article-title":"Our history"},{"journal-title":"Software Assurance Forum for Excellence in Code Technical Report","article-title":"Fundamental practices for secure software development: Essential elements of a secure development lifecycle program","year":"2018","key":"ref17"},{"year":"2020","key":"ref18","article-title":"Samm model overview"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.290110854"},{"key":"ref28","article-title":"Elevation of privilege: Drawing developers into threat modeling","author":"shostack","year":"2013","journal-title":"Tech Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079952"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.69"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.19"},{"key":"ref6","article-title":"Business versus technology: Sources of the perceived lack of cyber security in smes [working paper]","author":"osborn","year":"2014","journal-title":"Tech Rep"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.170"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2019.04.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46529-6_1"},{"key":"ref2","first-page":"281","article-title":"Security in the software development lifecycle","author":"assal","year":"0","journal-title":"Symposium on Usable Privacy and Security - SOUPS USENIX Association"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2018.1484598"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2010.159","article-title":"Are companies actually using secure development life cycles?","volume":"43","author":"geer","year":"2010","journal-title":"Computer"},{"year":"2020","key":"ref20","article-title":"Owasp mobile security"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on internet of things (iot) security: A survey","volume":"148","author":"hassan","year":"2019","journal-title":"Computer Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/dsj.2017.10"},{"key":"ref23","article-title":"What is prototyping?","author":"budde","year":"1992","journal-title":"Information Technology & People"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2783446.2783592"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2013.04.004"}],"event":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","start":{"date-parts":[[2022,7,20]]},"location":"Porto, Portugal","end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9907868\/9907893\/09907931.pdf?arnumber=9907931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:56:36Z","timestamp":1667516196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9907931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csndsp54353.2022.9907931","relation":{},"subject":[],"published":{"date-parts":[[2022,7,20]]}}}