{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:44Z","timestamp":1750306844586,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2530278","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"139-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A building code for building code"],"prefix":"10.1145","author":[{"given":"Carl E.","family":"Landwehr","sequence":"first","affiliation":[{"name":"George Washington University, McLean, VA"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Mythical Man-Month: Essays on Software Engineering","author":"Brooks F. P.","year":"1975","unstructured":"Brooks , F. P. , Jr. The Mythical Man-Month: Essays on Software Engineering . Addison Wesley , 1975 . Brooks, F. P., Jr. The Mythical Man-Month: Essays on Software Engineering. Addison Wesley, 1975."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.21236\/AD0772806","volume-title":"Computer Security Technology Planning Study. ESD-TR-73-51","author":"Anderson J. P.","year":"1972","unstructured":"Anderson . J. P. , ed. Computer Security Technology Planning Study. ESD-TR-73-51 , Vol. II , AFSC Hanscom Field , Bedford, MA , Oct. 1972 p. 62. Available at: http:\/\/seclab.cs.ucdavis.edu\/projects\/history\/papers\/ande72.pdf Anderson. J. P., ed. Computer Security Technology Planning Study. ESD-TR-73-51, Vol. II, AFSC Hanscom Field, Bedford, MA, Oct. 1972 p. 62. Available at: http:\/\/seclab.cs.ucdavis.edu\/projects\/history\/papers\/ande72.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Brunner J. Shockwave Rider. Harper & Row 1975.   Brunner J. Shockwave Rider . Harper & Row 1975."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"e_1_3_2_1_5_1","volume-title":"The helminthiasis of the Internet","author":"Reynolds J.","year":"1989","unstructured":"Reynolds , J. The helminthiasis of the Internet . Network Working Group RFC 1135m Dec. 1989 . Available at: http:\/\/www.ietf.org\/rfc\/rfc1135.txt Reynolds, J. The helminthiasis of the Internet. Network Working Group RFC 1135m Dec. 1989. Available at: http:\/\/www.ietf.org\/rfc\/rfc1135.txt"},{"key":"e_1_3_2_1_6_1","volume-title":"When HARLIE Was One","author":"Gerrold","year":"1972","unstructured":"Gerrold , David. When HARLIE Was One . Nelson Doubleday , 1972 . Gerrold, David. When HARLIE Was One. Nelson Doubleday, 1972."},{"key":"e_1_3_2_1_7_1","volume-title":"Wikipedia article, retrieved","author":"When HARLIE","year":"2013","unstructured":"\" When HARLIE Was One\" , Wikipedia article, retrieved 9 Nov. 2013 , from http:\/\/en.wikipedia.org\/wiki\/When_HARLIE_Was_One \"When HARLIE Was One\", Wikipedia article, retrieved 9 Nov. 2013, from http:\/\/en.wikipedia.org\/wiki\/When_HARLIE_Was_One"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. 7th DoD\/NBS Computer Security Conference","author":"Cohen F.","year":"1984","unstructured":"Cohen , F. Computer viruses: theory and experiments . Proc. 7th DoD\/NBS Computer Security Conference , 1984 , 240--263. Cohen, F. Computer viruses: theory and experiments. Proc. 7th DoD\/NBS Computer Security Conference, 1984, 240--263."},{"key":"e_1_3_2_1_9_1","volume-title":"Firewalls and Internet Security: Repelling the Wily Hacker","author":"Cheswick W. R.","year":"1994","unstructured":"Cheswick . W. R. and Bellovin, S. M . Firewalls and Internet Security: Repelling the Wily Hacker . Addison-Wesley , Reading, MA , first edition, 1994 . Available for personal use at: http:\/\/www.wilyhacker.com\/1e\/ Cheswick. W. R. and Bellovin, S. M. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, MA, first edition, 1994. Available for personal use at: http:\/\/www.wilyhacker.com\/1e\/"},{"key":"e_1_3_2_1_10_1","volume-title":"F The Code of Hammurabi King of Bablyon","author":"Harper R.","year":"1904","unstructured":"Harper , R. F The Code of Hammurabi King of Bablyon , University of Chicago Press , 1904 , p. 81. Available at: http:\/\/upload.wikimedia.org\/wikipedia\/en\/4\/4e\/The_code_of_Hammurabi.pdf Harper, R. F The Code of Hammurabi King of Bablyon, University of Chicago Press, 1904, p. 81. Available at: http:\/\/upload.wikimedia.org\/wikipedia\/en\/4\/4e\/The_code_of_Hammurabi.pdf"},{"volume-title":"Luminarium Encyclopedia Project: http:\/\/www.luminarium.org\/encyclopedia\/greatfire.htm","author":"The Great Fire","key":"e_1_3_2_1_11_1","unstructured":"The Great Fire of London, 1666. Luminarium Encyclopedia Project: http:\/\/www.luminarium.org\/encyclopedia\/greatfire.htm The Great Fire of London, 1666. Luminarium Encyclopedia Project: http:\/\/www.luminarium.org\/encyclopedia\/greatfire.htm"},{"key":"e_1_3_2_1_12_1","first-page":"1628","volume":"5","author":"An Act","year":"1819","unstructured":"An Act for Rebuilding the City of London, 1666. Statutes of the Realm , Vol. 5 , 1628 - 1680 ( 1819 ), J. Raithby, ed. pp 603--612. Available at: http:\/\/www.british-history.ac.uk\/report.aspx?compid=47390&strquery=Building%20Act#s5 An Act for Rebuilding the City of London, 1666. Statutes of the Realm, Vol. 5, 1628-80 (1819), J. Raithby, ed. pp 603--612. Available at: http:\/\/www.british-history.ac.uk\/report.aspx?compid=47390&strquery=Building%20Act#s5","journal-title":"Statutes of the Realm"},{"key":"e_1_3_2_1_13_1","unstructured":"Regulations for building construction and fire safety Florilegium Urbanum website. Original source cited as Corporation of London Records Office Liber Custuarum f. 52. Translated from Latin available at: http:\/\/users.trytel.com\/~tristan\/towns\/florilegium\/community\/cmfabr08.html  Regulations for building construction and fire safety Florilegium Urbanum website. Original source cited as Corporation of London Records Office Liber Custuarum f. 52. Translated from Latin available at: http:\/\/users.trytel.com\/~tristan\/towns\/florilegium\/community\/cmfabr08.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Earthquake's Impact on Building Codes. Multidisciplinary Center for Earthquake Engineering (MCEER) SUNY Buffalo web page. Available at: http:\/\/mceer.buffalo.edu\/1906_Earthquake\/industry_impacts\/impact-building-codes.asp  Earthquake's Impact on Building Codes. Multidisciplinary Center for Earthquake Engineering (MCEER) SUNY Buffalo web page. Available at: http:\/\/mceer.buffalo.edu\/1906_Earthquake\/industry_impacts\/impact-building-codes.asp"},{"key":"e_1_3_2_1_15_1","volume-title":"Lessons of Disaster: Policy Change After Catastrophic Events","author":"Birkland T. A.","year":"2006","unstructured":"Birkland , T. A. Lessons of Disaster: Policy Change After Catastrophic Events . Georgetown U. Press , 2006 . Birkland, T. A. Lessons of Disaster: Policy Change After Catastrophic Events. Georgetown U. Press, 2006."},{"key":"e_1_3_2_1_16_1","volume-title":"C-H. California Earthquakes: Science, Risk, and the Politics of Hazard Mitigation","author":"Geschwind","year":"2001","unstructured":"Geschwind , C-H. California Earthquakes: Science, Risk, and the Politics of Hazard Mitigation . Johns Hopkins U. Press , 2001 . Geschwind, C-H. California Earthquakes: Science, Risk, and the Politics of Hazard Mitigation. Johns Hopkins U. Press, 2001."},{"key":"e_1_3_2_1_17_1","volume-title":"June 1","author":"Nelander B.","year":"2008","unstructured":"Nelander , B. \"The hurricane of 1928 : category 4 hurricane scarred Palm Beach,\" Palm Beach Daily News , June 1 , 2008 . Retrieved from Internet Archive , http:\/\/web.archive.org\/web\/20080920065230\/http:\/\/www.palmbeachdailynews.com\/news\/content\/specialsections\/HURRICANE1928page.html 7 October 2013. Nelander, B. \"The hurricane of 1928: category 4 hurricane scarred Palm Beach,\" Palm Beach Daily News, June 1, 2008. Retrieved from Internet Archive, http:\/\/web.archive.org\/web\/20080920065230\/http:\/\/www.palmbeachdailynews.com\/news\/content\/specialsections\/HURRICANE1928page.html 7 October 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"retrieved","author":"Okeechobee","year":"2013","unstructured":"\"1928 Okeechobee hurricane.\" Wikipedia article , retrieved 7 October 2013 from: http:\/\/en.wikipedia.org\/wiki\/Okeechobee_Hurricane#cite_note-27 \"1928 Okeechobee hurricane.\" Wikipedia article, retrieved 7 October 2013 from: http:\/\/en.wikipedia.org\/wiki\/Okeechobee_Hurricane#cite_note-27"},{"key":"e_1_3_2_1_19_1","volume-title":"May 27, 1999. Retrieved","author":"Bragg R.","year":"2013","unstructured":"Bragg , R. \"Storm over south Florida building codes.\" New York Times , May 27, 1999. Retrieved 7 October 2013 from http:\/\/www.nytimes.com\/1999\/05\/27\/us\/storm-over-south-florida-building-codes.html Bragg, R. \"Storm over south Florida building codes.\" New York Times, May 27, 1999. Retrieved 7 October 2013 from http:\/\/www.nytimes.com\/1999\/05\/27\/us\/storm-over-south-florida-building-codes.html"},{"key":"e_1_3_2_1_20_1","volume-title":"US Department of Commerce. (May","author":"National Bureau of Standards \"Investigation of the Kansas City Hyatt Regency Walkways Collapse\".","year":"1982","unstructured":"National Bureau of Standards \"Investigation of the Kansas City Hyatt Regency Walkways Collapse\". US Department of Commerce. (May 1982 ). National Bureau of Standards \"Investigation of the Kansas City Hyatt Regency Walkways Collapse\". US Department of Commerce. (May 1982)."},{"key":"e_1_3_2_1_21_1","unstructured":"Perez A. R. Murrah Federal Office Building. Article in Failures Wiki: Building Architectural and Civil Engineering Failures and Forensic Practices (overview available at http:\/\/failures.wikispaces.com\/Home; this article at: http:\/\/failures.wikispaces.com\/Murrah+Federal+Building.  Perez A. R. Murrah Federal Office Building. Article in Failures Wiki: Building Architectural and Civil Engineering Failures and Forensic Practices (overview available at http:\/\/failures.wikispaces.com\/Home; this article at: http:\/\/failures.wikispaces.com\/Murrah+Federal+Building."},{"key":"e_1_3_2_1_22_1","unstructured":"Wikipedia entry \"Oklahoma City Bombing \" http:\/\/en.wikipedia.org\/wiki\/Oklahoma_City_bombing  Wikipedia entry \"Oklahoma City Bombing \" http:\/\/en.wikipedia.org\/wiki\/Oklahoma_City_bombing"},{"key":"e_1_3_2_1_23_1","volume-title":"Dec.","author":"Ratay R. T.","year":"2010","unstructured":"Ratay , R. T. \"Changes in Codes , Standards and Practices Followign Structural Failures, Part 1: Bridges,\" STRUCTURE Magazine , Dec. 2010 , 16--19. Ratay, R. T. \"Changes in Codes, Standards and Practices Followign Structural Failures, Part 1: Bridges,\" STRUCTURE Magazine, Dec. 2010, 16--19."},{"key":"e_1_3_2_1_24_1","volume-title":"April.","author":"Ratay R. T.","year":"2011","unstructured":"Ratay , R. T. \"Changes in Codes , Standards and Practices Followign Structural Failures, Part 2: Buildings.\" STRUCTURE Magazine , April. 2011 , 21--24. Ratay, R. T. \"Changes in Codes, Standards and Practices Followign Structural Failures, Part 2: Buildings.\" STRUCTURE Magazine, April. 2011, 21--24."},{"key":"e_1_3_2_1_25_1","unstructured":"International Building Code 2009 Sixth Printing. Available at: http:\/\/publicecodes.cyberregs.com\/icod\/ibc\/2009\/  International Building Code 2009 Sixth Printing. Available at: http:\/\/publicecodes.cyberregs.com\/icod\/ibc\/2009\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363143"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/361598.361623"},{"key":"e_1_3_2_1_28_1","volume-title":"Hierarchical Structure,\" IFIP Congress","author":"Parnas D. L.","year":"1974","unstructured":"Parnas , D. L. \"On a 'Buzzword' : Hierarchical Structure,\" IFIP Congress 1974 , North Holland, 336--339, reprinted in Software Fundamentals : Collected Papers by D. L. Parnas, D. M Hoffman and D. M. Weiss, eds., Addison Wesley , 2001. Parnas, D. L. \"On a 'Buzzword': Hierarchical Structure,\" IFIP Congress 1974, North Holland, 336--339, reprinted in Software Fundamentals: Collected Papers by D. L. Parnas, D. M Hoffman and D. M. Weiss, eds., Addison Wesley, 2001."},{"key":"e_1_3_2_1_29_1","volume-title":"Committee on Certifiably Dependable Systems, Software for Dependable Systems: Sufficient Evidence?","author":"Jackson D.","year":"2007","unstructured":"Jackson , D. , Thomas, M. and Millett , L . eds ., Committee on Certifiably Dependable Systems, Software for Dependable Systems: Sufficient Evidence? National Academies Press , 2007 . Accessible at: http:\/\/www.nap.edu\/catalog.php?record_id=11923 Jackson, D., Thomas, M. and Millett, L. eds., Committee on Certifiably Dependable Systems, Software for Dependable Systems: Sufficient Evidence? National Academies Press, 2007. Accessible at: http:\/\/www.nap.edu\/catalog.php?record_id=11923"},{"key":"e_1_3_2_1_30_1","volume-title":"Issued","author":"US Food and Drug Administration","year":"2002","unstructured":"US Food and Drug Administration . General Principles of Software Validation; Final Guidance for Industry and FDA Staff . Issued Jan. 11, 2002 . Available at: http:\/\/www.fda.gov\/medicaldevices\/deviceregulationandguidance\/guidancedocuments\/ucm085281.htm#_Toc517237933 US Food and Drug Administration. General Principles of Software Validation; Final Guidance for Industry and FDA Staff. Issued Jan. 11, 2002. Available at: http:\/\/www.fda.gov\/medicaldevices\/deviceregulationandguidance\/guidancedocuments\/ucm085281.htm#_Toc517237933"},{"key":"e_1_3_2_1_31_1","unstructured":"Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff. Issued June 14 2013. Available at: http:\/\/www.fda.gov\/medicaldevices\/deviceregulationandguidance\/guidancedocuments\/ucm356186.htm  Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff. Issued June 14 2013. Available at: http:\/\/www.fda.gov\/medicaldevices\/deviceregulationandguidance\/guidancedocuments\/ucm356186.htm"},{"key":"e_1_3_2_1_32_1","unstructured":"Department of Defense Trusted Computer Security Evaluation Center DOD 5200.28-STD 1985. Available at: http:\/\/seclab.cs.ucdavis.edu\/projects\/history\/papers\/dod85.pdf available at http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf when US government operating normally.  Department of Defense Trusted Computer Security Evaluation Center DOD 5200.28-STD 1985. Available at: http:\/\/seclab.cs.ucdavis.edu\/projects\/history\/papers\/dod85.pdf available at http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf when US government operating normally."},{"key":"e_1_3_2_1_33_1","first-page":"2012","volume":"4","author":"The Common Criteria","year":"2009","unstructured":"The Common Criteria for Information Technology Security Evaluation, Part 1, Version 3.1 , Rev. 4 , September 2009 . CCMB- 2012 - 2009 -001. Part 2, Security Functional Requirements, Part 3, Security Assurance Requirements. All Available at: http:\/\/www.commoncriteriaportal.org\/cc\/ The Common Criteria for Information Technology Security Evaluation, Part 1, Version 3.1, Rev. 4, September 2009. CCMB-2012-09-001. Part 2, Security Functional Requirements, Part 3, Security Assurance Requirements. All Available at: http:\/\/www.commoncriteriaportal.org\/cc\/","journal-title":"Rev."},{"key":"e_1_3_2_1_34_1","volume-title":"Security Requirements for Cryptographic Modules. Federal Information Processing Standards (FIPS) Publication 140--2. May 25","author":"National Institute of Standards and Technology (NIST).","year":"2001","unstructured":"National Institute of Standards and Technology (NIST). Security Requirements for Cryptographic Modules. Federal Information Processing Standards (FIPS) Publication 140--2. May 25 . 2001 . National Institute of Standards and Technology (NIST). Security Requirements for Cryptographic Modules. Federal Information Processing Standards (FIPS) Publication 140--2. May 25. 2001."},{"key":"e_1_3_2_1_35_1","first-page":"155","volume-title":"Kluwer","author":"Landwehr C.","year":"2004","unstructured":"Landwehr , C. \"Improving information flow in the information security market,\" in Economics of Information Security, L. Jean Camp and S. Lewis, ed ., Kluwer , 2004 , pp. 155 -- 164 . Available at: http:\/\/www.landwehr.org\/Carl%20E.%20Landwehr\/Publications.html Landwehr, C. \"Improving information flow in the information security market,\" in Economics of Information Security, L. Jean Camp and S. Lewis, ed., Kluwer, 2004, pp. 155--164. Available at: http:\/\/www.landwehr.org\/Carl%20E.%20Landwehr\/Publications.html"},{"key":"e_1_3_2_1_36_1","volume-title":"Oct.","author":"McGraw G.","year":"2013","unstructured":"McGraw , G. , Migues, S. , and West , J . Building Security In Maturity Model: BSIMM-V , Oct. 2013 . Available at: website. http:\/\/bsimm.com\/ McGraw, G., Migues, S., and West, J. Building Security In Maturity Model: BSIMM-V, Oct. 2013. Available at: website. http:\/\/bsimm.com\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Version 1.0. Downloaded","author":"Chandra","year":"2013","unstructured":"Chandra , Pravir. Software Assurance Maturity Model ., Version 1.0. Downloaded 9 Nov. 2013 . An OWASP project, available at: http:\/\/www.opensamm.org Chandra, Pravir. Software Assurance Maturity Model., Version 1.0. Downloaded 9 Nov. 2013. An OWASP project, available at: http:\/\/www.opensamm.org"},{"key":"e_1_3_2_1_38_1","volume-title":"February 12","author":"Obama B.","year":"2013","unstructured":"Obama , B. , Improving critical infrastructure cybersecurity. Executive Order 13636 , February 12 , 2013 . Federal Register Vol . 78, No. 33, Feb. 19, 2013. Available at: www.gpo.gov\/fdsys\/pkg\/FR-2013-02-19\/pdf\/2013-03915.pdf Obama, B., Improving critical infrastructure cybersecurity. Executive Order 13636, February 12, 2013. Federal Register Vol. 78, No. 33, Feb. 19, 2013. Available at: www.gpo.gov\/fdsys\/pkg\/FR-2013-02-19\/pdf\/2013-03915.pdf"},{"key":"e_1_3_2_1_39_1","volume-title":"NIST","author":"Improving Critical Infrastructure Cybersecurity","year":"2013","unstructured":"Improving Critical Infrastructure Cybersecurity : Preliminary Cybersecurity Framework . NIST , October 29, 2013 . Available at: http:\/\/www.nist.gov\/itl\/upload\/preliminary-cybersecurity-framework.pdf Improving Critical Infrastructure Cybersecurity: Preliminary Cybersecurity Framework. NIST, October 29, 2013. Available at: http:\/\/www.nist.gov\/itl\/upload\/preliminary-cybersecurity-framework.pdf"},{"key":"e_1_3_2_1_40_1","volume-title":"Naval Research Laboratory","author":"Park J.","year":"2002","unstructured":"Park , J. , Moore, A. , Montrose , B. , Strohmeyer , B. , and Froscher , J . A methodology, a language, and a tool to provide security assurance arguments. NRL\/MR\/5540-02-8600 , Naval Research Laboratory , Feb. , 2002 . Available at: www.dtic.mil\/cgi-bin\/GetTRDoc?AD*=ADA399505 Park, J., Moore, A., Montrose, B., Strohmeyer, B., and Froscher, J. A methodology, a language, and a tool to provide security assurance arguments. NRL\/MR\/5540-02-8600, Naval Research Laboratory, Feb., 2002. Available at: www.dtic.mil\/cgi-bin\/GetTRDoc?AD*=ADA399505"},{"key":"e_1_3_2_1_41_1","volume-title":"January 8.","author":"Cyber Security Jobs Report","year":"2013","unstructured":"Cyber Security Jobs Report . Abell Foundation and Cyber Point LLC , January 8. 2013 . Available from: http:\/\/www.ctic-baltimore.com\/report.html Cyber Security Jobs Report. Abell Foundation and Cyber Point LLC, January 8. 2013. Available from: http:\/\/www.ctic-baltimore.com\/report.html"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.158"},{"key":"e_1_3_2_1_43_1","first-page":"D1","author":"Neil D.","year":"2013","unstructured":"Neil , D. \"Lexus ES 300h: A Smooth , Elegant Guilt Eraser,\" The Wall Street Journal , March 16--17 , 2013 , p. D1 . Neil, D. \"Lexus ES 300h: A Smooth, Elegant Guilt Eraser,\" The Wall Street Journal, March 16--17, 2013, p. D1.","journal-title":"March 16--17"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2530278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2530278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:10Z","timestamp":1750234210000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2530278"}},"subtitle":["putting what we know works to work"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":43,"alternative-id":["10.1145\/2523649.2530278","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2530278","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}