{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:18Z","timestamp":1750307718384,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,8]],"date-time":"2009-03-08T00:00:00Z","timestamp":1236470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["032-5269043-0166"],"award-info":[{"award-number":["032-5269043-0166"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,8]]},"DOI":"10.1145\/1529282.1529360","type":"proceedings-article","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T13:37:11Z","timestamp":1239802631000},"page":"355-359","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying vulnerabilities and critical requirements using criminal court proceedings"],"prefix":"10.1145","author":[{"given":"Travis D.","family":"Breaux","sequence":"first","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonathan D.","family":"Lewis","sequence":"additional","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul N.","family":"Otto","sequence":"additional","affiliation":[{"name":"North Carolina State University and Duke University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Annie I.","family":"Ant\u00f3n","sequence":"additional","affiliation":[{"name":"North Carolina State University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"61","article-title":"Initial industrial experience of misuse cases in trade-off analysis","author":"Alexander I.","year":"2002","unstructured":"I. Alexander , \" Initial industrial experience of misuse cases in trade-off analysis ,\" IEEE Joint Int'l Conf. Req'ts Engr. , pp. 61 -- 68 , 2002 . I. Alexander, \"Initial industrial experience of misuse cases in trade-off analysis,\" IEEE Joint Int'l Conf. Req'ts Engr., pp. 61--68, 2002.","journal-title":"IEEE Joint Int'l Conf. Req'ts Engr."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.68"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70746"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"e_1_3_2_1_6_1","volume-title":"S. D. FI.","author":"United States v. Ferrer, et al.","year":"2006","unstructured":"United States v. Ferrer, et al. Case No. 0:06-CR-60261-JIC , S. D. FI. , Dec. 7, 2006 . United States v. Ferrer, et al. Case No. 0:06-CR-60261-JIC, S. D. FI., Dec. 7, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"Black's Law Dictionary","author":"Garner B. A.","year":"2004","unstructured":"B. A. Garner , Ed., Black's Law Dictionary , 8 th ed., Thompson West , 2004 . B. A. Garner, Ed., Black's Law Dictionary, 8th ed., Thompson West, 2004.","edition":"8"},{"key":"e_1_3_2_1_8_1","first-page":"2","volume-title":"Modern Criminal Procedure: Cases, Comments, and Questions","author":"Kamisar Y.","year":"2005","unstructured":"Y. Kamisar Modern Criminal Procedure: Cases, Comments, and Questions , 11 th ed., St. Paul, Minn .: Thomson\/West , 2005 , pp. 2 -- 20 . Y. Kamisar et al. Modern Criminal Procedure: Cases, Comments, and Questions, 11th ed., St. Paul, Minn.: Thomson\/West, 2005, pp. 2--20.","edition":"11"},{"key":"e_1_3_2_1_9_1","first-page":"148","volume-title":"Soft. Engr.","author":"van Lamsweerde A.","year":"2004","unstructured":"A. van Lamsweerde , \"Elaborating security requirements by construction of intentional anti-models,\" IEEE 26th Int'l Conf . Soft. Engr. , pp. 148 -- 157 , 2004 . A. van Lamsweerde, \"Elaborating security requirements by construction of intentional anti-models,\" IEEE 26th Int'l Conf. Soft. Engr., pp. 148--157, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/784590.784691"},{"key":"e_1_3_2_1_11_1","first-page":"5","volume-title":"Conf.","author":"Otto P. N.","year":"2007","unstructured":"P. N. Otto , A. I. Ant\u00f3n , \"Addressing legal requirements in requirements engineering,\" 15th IEEE Int'l Req'ts Engr . Conf. , pp. 5 -- 14 , 2007 . P. N. Otto, A. I. Ant\u00f3n, \"Addressing legal requirements in requirements engineering,\" 15th IEEE Int'l Req'ts Engr. Conf., pp. 5--14, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/525585.787290"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.55"},{"volume-title":"July 24, 2007.","author":"Winn P.","key":"e_1_3_2_1_15_1","unstructured":"P. Winn , \"Confronting the threats of medical identity theft,\" Health Information Privacy\/Security Alert , July 24, 2007. P. Winn, \"Confronting the threats of medical identity theft,\" Health Information Privacy\/Security Alert, July 24, 2007."},{"key":"e_1_3_2_1_16_1","article-title":"2007 E-crime watch survey shows security incidents, electronic crimes and their impact steady versus last year","author":"Yanovitch S.","year":"2007","unstructured":"S. Yanovitch , K. Kimberland , \" 2007 E-crime watch survey shows security incidents, electronic crimes and their impact steady versus last year ,\" CSO Magazine , Sep. 2007 . S. Yanovitch, K. Kimberland, \"2007 E-crime watch survey shows security incidents, electronic crimes and their impact steady versus last year,\" CSO Magazine, Sep. 2007.","journal-title":"CSO Magazine"},{"key":"e_1_3_2_1_17_1","volume-title":"Y in. Case Study Research","author":"R.","year":"2003","unstructured":"R. K. Y in. Case Study Research , 3 rd ed. Applied Social Research Methods Series, v. 5, Sage Pubs ., 2003 . R. K. Y in. Case Study Research, 3rd ed. Applied Social Research Methods Series, v. 5, Sage Pubs., 2003.","edition":"3"}],"event":{"name":"SAC09: The 2009 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Honolulu Hawaii","acronym":"SAC09"},"container-title":["Proceedings of the 2009 ACM symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529282.1529360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1529282.1529360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:27Z","timestamp":1750253427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529282.1529360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,8]]},"references-count":16,"alternative-id":["10.1145\/1529282.1529360","10.1145\/1529282"],"URL":"https:\/\/doi.org\/10.1145\/1529282.1529360","relation":{},"subject":[],"published":{"date-parts":[[2009,3,8]]},"assertion":[{"value":"2009-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}