{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:47:46Z","timestamp":1776116866538,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318323"],"award-info":[{"award-number":["1318323"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Security Agency"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786816","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"260-271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Quantifying developers' adoption of security tools"],"prefix":"10.1145","author":[{"given":"Jim","family":"Witschey","sequence":"first","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Olga","family":"Zielinska","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Allaire","family":"Welk","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Emerson","family":"Murphy-Hill","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Chris","family":"Mayhorn","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alan Coopersmith. X.org security advisory: Cve-2013-6462: Stack buffer overflow in parsing of bdf font files in libxfont. http:\/\/lists.x.org\/archives\/xorg-announce\/ 2014-January\/002389.html.  Alan Coopersmith. X.org security advisory: Cve-2013-6462: Stack buffer overflow in parsing of bdf font files in libxfont. http:\/\/lists.x.org\/archives\/xorg-announce\/ 2014-January\/002389.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Ibm spss amos 22 user\u02c7 Ss guide","author":"Arbuckle J. L.","year":"2013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2011.546257"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.91.2.67"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/09590550110397033"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00031-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25967-1_12"},{"key":"e_1_3_2_1_10_1","volume-title":"Statistical power analysis for the behavioral sciences","author":"Cohen J.","year":"1977"},{"key":"e_1_3_2_1_11_1","volume-title":"Web Survey Design and Administration. Public opinion quarterly, 65:230\u2013253","author":"Couper M.","year":"2001"},{"key":"e_1_3_2_1_12_1","unstructured":"Daniel Marjam\u00e4ki. cppcheck. http:\/\/cppcheck.sourceforge.net\/.  Daniel Marjam\u00e4ki. cppcheck. http:\/\/cppcheck.sourceforge.net\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240610690052"},{"key":"e_1_3_2_1_15_1","unstructured":"Facebook Incorporated. Facebook bug bounty. https:\/\/www.facebook.com\/BugBounty.  Facebook Incorporated. Facebook bug bounty. https:\/\/www.facebook.com\/BugBounty."},{"key":"e_1_3_2_1_16_1","unstructured":"GitHub Incorporated. Github security bug bounty program. https:\/\/bounty.github.com\/.  GitHub Incorporated. Github security bug bounty program. https:\/\/bounty.github.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985451"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_19_1","volume-title":"O\u2019Reilly Media","author":"Howard M.","year":"2009"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486877"},{"key":"e_1_3_2_1_21_1","unstructured":"Klocwork Incorporated. Source code analysis tools. http:\/\/www.klocwork.com\/.  Klocwork Incorporated. Source code analysis tools. http:\/\/www.klocwork.com\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2616"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119013563"},{"key":"e_1_3_2_1_24_1","volume-title":"Handbook of survey research","author":"Marsden P. V.","year":"2010"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281254"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509515"},{"key":"e_1_3_2_1_27_1","unstructured":"Microsoft. Microsoft security development lifecycle. http:\/\/www.microsoft.com\/security\/sdl\/ default.aspx.  Microsoft. Microsoft security development lifecycle. http:\/\/www.microsoft.com\/security\/sdl\/ default.aspx."},{"key":"e_1_3_2_1_28_1","volume-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation. Information systems research","author":"Moore G.","year":"1991"},{"key":"e_1_3_2_1_29_1","unstructured":"Mozilla.org. Mozilla security bug bounty program. https:\/\/www.mozilla.org\/security\/bugbounty.html.  Mozilla.org. Mozilla security bug bounty program. https:\/\/www.mozilla.org\/security\/bugbounty.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958888"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_32_1","unstructured":"OWASP Foundation. Owasp. https:\/\/www.owasp.org\/ index.php\/Main_Page.  OWASP Foundation. Owasp. https:\/\/www.owasp.org\/ index.php\/Main_Page."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1995.10476488"},{"key":"e_1_3_2_1_34_1","volume-title":"Diffusion of innovations","author":"Rogers E. M.","year":"1995"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4603(02)00300-3"},{"issue":"431","key":"e_1_3_2_1_36_1","first-page":"822","article-title":"\u201cdon\u2019t know","volume":"90","author":"Rubin D.","year":"1995","journal-title":"Journal of the American Statistical Association"},{"key":"e_1_3_2_1_37_1","volume-title":"Akaike information criterion statistics","author":"Sakamoto Y.","year":"1986"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2013.6614738"},{"key":"e_1_3_2_1_40_1","volume-title":"Action research","author":"Stringer E. T.","year":"2013"},{"issue":"3","key":"e_1_3_2_1_41_1","first-page":"227","article-title":"Explaining odds ratios","volume":"19","author":"Szumilas M.","year":"2010","journal-title":"Journal of the Canadian Academy of Child and Adolescent Psychiatry"},{"key":"e_1_3_2_1_42_1","volume-title":"Factors Influencing the Adoption of Internet Banking. Journal of the AIS, 1(July)","author":"Tan M.","year":"2000"},{"key":"e_1_3_2_1_43_1","volume-title":"R language definition","author":"Team R. C.","year":"2000"},{"key":"e_1_3_2_1_44_1","unstructured":"Twitter. Hackerone - twitter. https:\/\/hackerone.com\/twitter.  Twitter. Hackerone - twitter. https:\/\/hackerone.com\/twitter."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663898"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"},{"key":"e_1_3_2_1_47_1","first-page":"164","volume-title":"2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","author":"Xie J.","year":"2011"},{"key":"e_1_3_2_1_48_1","unstructured":"X.Org Foundation. xorg. http:\/\/www.x.org\/wiki\/.  X.Org Foundation. xorg. http:\/\/www.x.org\/wiki\/."}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Bergamo Italy","acronym":"ESEC\/FSE'15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":47,"alternative-id":["10.1145\/2786805.2786816","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786816","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}