{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:42:31Z","timestamp":1759092151180,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Construction Engineer Research Laboratories"},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1658971"],"award-info":[{"award-number":["1658971"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"TechLink"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3194164.3194167","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"138-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A position study to investigate technical debt associated with security weaknesses"],"prefix":"10.1145","author":[{"given":"Clemente","family":"Izurieta","sequence":"first","affiliation":[{"name":"Montana State University"}]},{"given":"David","family":"Rice","sequence":"additional","affiliation":[{"name":"Montana State University"}]},{"given":"Kali","family":"Kimball","sequence":"additional","affiliation":[{"name":"Georgia College &amp; State University"}]},{"given":"Tessa","family":"Valentien","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{Online} Available: cve.mitre.org  {Online} Available: cve.mitre.org"},{"key":"e_1_3_2_1_2_1","unstructured":"{Online} Available: cwe.mitre.org  {Online} Available: cwe.mitre.org"},{"key":"e_1_3_2_1_3_1","unstructured":"{Online} Available: cert.org  {Online} Available: cert.org"},{"key":"e_1_3_2_1_4_1","unstructured":"Software Product Evaluation---Quality Characteristics and Guidelines for Their Use ISO\/IEC Standard ISO-9126 1991  Software Product Evaluation---Quality Characteristics and Guidelines for Their Use ISO\/IEC Standard ISO-9126 1991"},{"key":"e_1_3_2_1_5_1","unstructured":"\"ISO\/IEC 25010:2011 Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - Systm and Software Quality Models \" Mar. 2011.  \"ISO\/IEC 25010:2011 Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - Systm and Software Quality Models \" Mar. 2011."},{"key":"e_1_3_2_1_6_1","unstructured":"\"SQALE Software Quality Assessment based on Lifecycle Expectations \" Feb. 2017. {Online}. Available: www.sqale.org  \"SQALE Software Quality Assessment based on Lifecycle Expectations \" Feb. 2017. {Online}. Available: www.sqale.org"},{"key":"e_1_3_2_1_7_1","first-page":"1133","volume-title":"Jun. 2012","author":"Wagner S.","unstructured":"S. Wagner , K. Lochmann , L. Heinemann , M. Klas , A. Trendowicz , R. Plosch , A. Seidi , A. Goeb , and J. Streit , \" The Quamoco product quality modelling and assessment approach.\" IEEE , Jun. 2012 , pp. 1133 -- 1142 . S. Wagner, K. Lochmann, L. Heinemann, M. Klas, A. Trendowicz, R. Plosch, A. Seidi, A. Goeb, and J. Streit, \"The Quamoco product quality modelling and assessment approach.\" IEEE, Jun. 2012, pp. 1133--1142."},{"key":"e_1_3_2_1_8_1","unstructured":"{Online} Available: castsoftware.com  {Online} Available: castsoftware.com"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.42"},{"volume-title":"April 17--22","year":"2016","key":"e_1_3_2_1_10_1","unstructured":"Managing Technical Debt in Software Engineering, Dagstuhl Reports, Vol. 6 , Issue 4 , April 17--22 , 2016 . {Online} Available: dagstuhl.de\/16162 Managing Technical Debt in Software Engineering, Dagstuhl Reports, Vol. 6, Issue 4, April 17--22, 2016. {Online} Available: dagstuhl.de\/16162"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.052"},{"key":"e_1_3_2_1_12_1","unstructured":"D. Tamburri Philippe Kruchten P. Lago and H. van Vliet. \"What is Social debt in Software Engineering \" CHASE 2013 San Francisco US. https:\/\/978-l-4673-6290-0\/13  D. Tamburri Philippe Kruchten P. Lago and H. van Vliet. \"What is Social debt in Software Engineering \" CHASE 2013 San Francisco US. https:\/\/978-l-4673-6290-0\/13"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985364"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.129"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.156"},{"key":"e_1_3_2_1_16_1","unstructured":"{Online} Available: sonarqube.org  {Online} Available: sonarqube.org"},{"key":"e_1_3_2_1_17_1","unstructured":"{Online} Available: cwe.mitre.org\/cwss\/cwss_vl.0.1.html  {Online} Available: cwe.mitre.org\/cwss\/cwss_vl.0.1.html"},{"key":"e_1_3_2_1_18_1","volume-title":"What to Fix? Distinguishing between design and non-design rules in automated tools,\" IEEE International Conference on Software Architecture (ICSA","author":"Ernst N.","year":"2017","unstructured":"N. Ernst , S. Bellomo , I. Ozkaya , and R. Nord , \" What to Fix? Distinguishing between design and non-design rules in automated tools,\" IEEE International Conference on Software Architecture (ICSA 2017 ). April 3--7, Gothenburg, Sweden . N. Ernst, S. Bellomo, I. Ozkaya, and R. Nord, \"What to Fix? Distinguishing between design and non-design rules in automated tools,\" IEEE International Conference on Software Architecture (ICSA 2017). April 3--7, Gothenburg, Sweden."},{"key":"e_1_3_2_1_19_1","unstructured":"\"ISO\/IEC 25010:2011 Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - Systm and Software Quality Models \" Mar. 2011.  \"ISO\/IEC 25010:2011 Systems and Software Engineering - Systems and Software Quality Requirements and Evaluation (SQuaRE) - Systm and Software Quality Models \" Mar. 2011."},{"key":"e_1_3_2_1_20_1","unstructured":"\"SonarQube Continous Code Quality \" Feb. 2017. {Online}. Available: www. sonarqube.org  \"SonarQube Continous Code Quality \" Feb. 2017. {Online}. Available: www. sonarqube.org"},{"key":"e_1_3_2_1_21_1","volume-title":"A Catalog of Security Architecture Weaknesses,\" 2017 IEEE International Conference on Software Architecture (ICSA)","author":"Tarrit J. C. S.","year":"2017","unstructured":"Santos, J. C. S. , Tarrit , K., and Mirakhorli, M . \" A Catalog of Security Architecture Weaknesses,\" 2017 IEEE International Conference on Software Architecture (ICSA) . 2017 . Santos, J. C. S., Tarrit, K., and Mirakhorli, M. \"A Catalog of Security Architecture Weaknesses,\" 2017 IEEE International Conference on Software Architecture (ICSA). 2017."},{"key":"e_1_3_2_1_22_1","unstructured":"Recommendation ITU-T X.1525. Common Weakness Scoring System (CWSS). {Online} Available: www.itu.int\/rec\/T-REC-X.1525\/en  Recommendation ITU-T X.1525. Common Weakness Scoring System (CWSS). {Online} Available: www.itu.int\/rec\/T-REC-X.1525\/en"},{"key":"e_1_3_2_1_23_1","unstructured":"{Online} Available: cwe.mitre.org\/cwraf  {Online} Available: cwe.mitre.org\/cwraf"},{"key":"e_1_3_2_1_24_1","unstructured":"{Online} Available: design.se.rit.edu\/catalog\/index.html  {Online} Available: design.se.rit.edu\/catalog\/index.html"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 2018 International Conference on Technical Debt"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194164.3194167","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194164.3194167","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194164.3194167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:09Z","timestamp":1750210749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194164.3194167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":24,"alternative-id":["10.1145\/3194164.3194167","10.1145\/3194164"],"URL":"https:\/\/doi.org\/10.1145\/3194164.3194167","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}