{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:57:21Z","timestamp":1763535441174,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,25]],"date-time":"2017-02-25T00:00:00Z","timestamp":1487980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Federal Ministry of Education and Research Germany","award":["EC-SPRIDE"],"award-info":[{"award-number":["EC-SPRIDE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,25]]},"DOI":"10.1145\/2998181.2998191","type":"proceedings-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T13:43:23Z","timestamp":1487079803000},"page":"2489-2503","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Can Security Become a Routine?"],"prefix":"10.1145","author":[{"given":"Andreas","family":"Poller","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany"}]},{"given":"Laura","family":"Kocksch","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany"}]},{"given":"Sven","family":"T\u00fcrpe","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Hesse, Germany"}]},{"given":"Felix Anand","family":"Epp","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology, Darmstadt, Hesse, Germany"}]},{"given":"Katharina","family":"Kinder-Kurlanda","sequence":"additional","affiliation":[{"name":"GESIS - Leibniz-Institute for the Social Sciences, K\u00f6ln, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,2,25]]},"reference":[{"unstructured":"K. Beck et al. 2001. Manifesto for Agile Software Development. (2001). http:\/\/agilemanifesto.org\/","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1065907.1066034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/MSP.2007.159"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/52.62930"},{"unstructured":"S. R. Clegg C. Hardy and W. R. Nord. 1996. Handbook of Organization Studies. SAGE Publications.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/2.963450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MSP.2011.80"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1093\/icc\/12.4.727"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.2307\/3556620"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/784592.784806"},{"volume-title":"The constitution of society: Outline of the theory of structuration","author":"Giddens A.","unstructured":"A. Giddens. 1984. The constitution of society: Outline of the theory of structuration. University of California Press.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"crossref","unstructured":"K. M. Goertzel T. Winograd H. L. McKinley L. J. Oh M. Colon T. McGibbon E. Fedchak and R. Vienneau. 2007. Software Security Assurance: A State-of-the-Art Report. Technical Report. IATAC & DACS.","key":"e_1_3_2_1_12_1","DOI":"10.21236\/ADA472363"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.5555\/863708"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2675133.2675177"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/2.947100"},{"doi-asserted-by":"publisher","unstructured":"M. Howard and S. Lipner. 2006. The Security Development Lifecycle. Microsoft Press.","key":"e_1_3_2_1_16_1","DOI":"10.5555\/1202957"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1287\/orsc.1050.0150"},{"volume-title":"Reassembling the Social - An Introduction to Actor-Network-Theory","author":"Latour B.","unstructured":"B. Latour. 2005. Reassembling the Social - An Introduction to Actor-Network-Theory. Oxford University Press.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.5555\/2818754.2818837"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1080\/08874417.2002.11647484","article-title":"Organizational factors for successful management of software development","volume":"42","author":"Leung H.","year":"2001","unstructured":"H. Leung. 2001. Organizational factors for successful management of software development. The Journal of Computer Information Systems 42, 2 (2001), 26.","journal-title":"The Journal of Computer Information Systems"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2531602.2531612"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/1121680"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1287\/orsc.3.3.398"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1147\/sj.403.0769"},{"key":"e_1_3_2_1_25_1","first-page":"5","article-title":"Wicked projects","volume":"10","author":"Poppendieck M.","year":"2002","unstructured":"M. Poppendieck. 2002. Wicked projects. Software Development Magazine 10, 5 (May 2002), 72--76.","journal-title":"Software Development Magazine"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1111\/j.1365-2575.2007.00259.x"},{"doi-asserted-by":"publisher","unstructured":"K. Schwaber and M. Beedle. 2002. Agile Software Development with Scrum. Prentice Hall.","key":"e_1_3_2_1_27_1","DOI":"10.5555\/559553"},{"unstructured":"K. Schwaber and J. Sutherland. 2013. The Scrum Guide. http:\/\/scrumguides.org\/.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/MC.2016.38"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2675133.2675215"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/S1084-8568(96)90004-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/38407"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/MSECP.2003.1219078"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1016\/j.ijhcs.2009.03.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2133806.2133823"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2531602.2531722"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/2207676.2208665"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CSCW '17","name":"CSCW '17: Computer Supported Cooperative Work and Social Computing","location":"Portland Oregon USA"},"container-title":["Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998191","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2998181.2998191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:12Z","timestamp":1750218612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998191"}},"subtitle":["A Study of Organizational Change in an Agile Software Development Group"],"short-title":[],"issued":{"date-parts":[[2017,2,25]]},"references-count":37,"alternative-id":["10.1145\/2998181.2998191","10.1145\/2998181"],"URL":"https:\/\/doi.org\/10.1145\/2998181.2998191","relation":{},"subject":[],"published":{"date-parts":[[2017,2,25]]},"assertion":[{"value":"2017-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}