{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:33Z","timestamp":1750306293961,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T00:00:00Z","timestamp":1463356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2016,5,16]]},"DOI":"10.1145\/2910587","type":"journal-article","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T15:58:00Z","timestamp":1463500680000},"page":"39-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["THINKING PROFESSIONALLYA professional approach to risk management"],"prefix":"10.1145","volume":"7","author":[{"given":"Don","family":"Gotterbarn","sequence":"first","affiliation":[{"name":"East Tennessee State University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,5,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ACM Code of Ethics; https:\/\/www.acm.org\/about-acm\/acm-code-of-ethics-and-professional-conduct. Accessed 2016 February 8.  ACM Code of Ethics; https:\/\/www.acm.org\/about-acm\/acm-code-of-ethics-and-professional-conduct. Accessed 2016 February 8."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11569-012-0141-7"},{"key":"e_1_2_1_4_1","unstructured":"Friedman B Kahn P and Borning A \"Value sensitive design and information systems.\" in Zhang P. Galletta D. eds. Human-computer interaction in management information systems: foundations. (M.E Sharpe Armonk 2006).  Friedman B Kahn P and Borning A \"Value sensitive design and information systems.\" in Zhang P. Galletta D. eds. Human-computer interaction in management information systems: foundations . (M.E Sharpe Armonk 2006)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024338.1024344"},{"key":"e_1_2_1_6_1","unstructured":"McDermott J. and Fox C. \"Using Abuse Case Models for Security Requirements Analysis.\" Computer Security Applications Conference 15 Annual Proceeding 1999 (ACSAC'99).   McDermott J. and Fox C. \"Using Abuse Case Models for Security Requirements Analysis.\" Computer Security Applications Conference 15 Annual Proceeding 1999 (ACSAC'99)."},{"key":"e_1_2_1_7_1","unstructured":"Ransomware; http:\/\/www.wired.com\/2016\/02\/hack-brief-hackers-are-holding-an-la-hospitals-computers-hostage\/ Accessed 2016 February 8 and http:\/\/qz.com\/619629\/a-los-angeles-hospital-paid-17000-in-ransom-to-hackers-blocking-access-to-patient-records\/? Accessed 2016 February 8.  Ransomware; http:\/\/www.wired.com\/2016\/02\/hack-brief-hackers-are-holding-an-la-hospitals-computers-hostage\/ Accessed 2016 February 8 and http:\/\/qz.com\/619629\/a-los-angeles-hospital-paid-17000-in-ransom-to-hackers-blocking-access-to-patient-records\/? Accessed 2016 February 8."},{"key":"e_1_2_1_8_1","unstructured":"Rumbaugh J. Jacobson I. and Booch G. The Unified Modeling Language Reference Manual. (Addison Wesley 1999).   Rumbaugh J. Jacobson I. and Booch G. The Unified Modeling Language Reference Manual . (Addison Wesley 1999)."},{"key":"e_1_2_1_9_1","unstructured":"Software Engineering Code 5.2; http:\/\/www.acm.org\/about\/se-code 1999. Accessed 2016 February 8.  Software Engineering Code 5.2; http:\/\/www.acm.org\/about\/se-code 1999. Accessed 2016 February 8."},{"key":"e_1_2_1_10_1","unstructured":"Sindre G. and Opdahl A.L. \"Capturing security requirements through misuse cases \" Norsk Informatikkonferanse 2001; http:\/\/www.nik.no\/2001 Accessed 2016 March 29.  Sindre G. and Opdahl A.L. \"Capturing security requirements through misuse cases \" Norsk Informatikkonferanse 2001 ; http:\/\/www.nik.no\/2001 Accessed 2016 March 29."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2910587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2910587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:09Z","timestamp":1750221549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2910587"}},"subtitle":["the missing use case exercise"],"short-title":[],"issued":{"date-parts":[[2016,5,16]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,5,16]]}},"alternative-id":["10.1145\/2910587"],"URL":"https:\/\/doi.org\/10.1145\/2910587","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2016,5,16]]},"assertion":[{"value":"2016-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}