{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:49Z","timestamp":1750221109765,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T00:00:00Z","timestamp":1546387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2019,1,2]]},"abstract":"<jats:p>This workshop focused on bringing software developers and legal professionals together to understand the shared challenges they face in promoting the development of secure software on the one hand, and software at all, on the other hand. This report summarizes current scientific research on the topics and challenges discussed in the workshop breakout sessions. The insights from the workshop highlight a number of interesting directions for further research on the interplay between software warranties and cybersecurity.<\/jats:p>","DOI":"10.1145\/3282517.3282539","type":"journal-article","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T13:33:51Z","timestamp":1546608831000},"page":"53-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Effect of Software Warranties on Cybersecurity"],"prefix":"10.1145","volume":"43","author":[{"given":"Dirk","family":"van der Linden","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, England UK"}]},{"given":"Awais","family":"Rashid","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, England UK"}]}],"member":"320","published-online":{"date-parts":[[2019,1,2]]},"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282517.3282539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282517.3282539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:56Z","timestamp":1750208516000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282517.3282539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,2]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,1,2]]}},"alternative-id":["10.1145\/3282517.3282539"],"URL":"https:\/\/doi.org\/10.1145\/3282517.3282539","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2019,1,2]]},"assertion":[{"value":"2019-01-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}