{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:15Z","timestamp":1750220895343,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360728","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a delegation-type secure software development method"],"prefix":"10.1145","author":[{"given":"An\u017ee","family":"Miheli\u010d","sequence":"first","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia and University of Maribor"}]},{"given":"Toma\u017e","family":"Hovelja","sequence":"additional","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]},{"given":"Simon L. R.","family":"Vrhovec","sequence":"additional","affiliation":[{"name":"University of Maribor, Ljubljana, Slovenia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"volume-title":"10th International Conference on the Quality of Information and Communications Technology (QUATIC). IEEE","year":"2016","author":"Hassan Adelyar S","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.45"},{"key":"e_1_3_2_1_3_1","unstructured":"P Hersey and K H Blanchard. 1977. Management of Organizational Behavior: Utilizing Human Resources (3rd ed. ed.). Prentice Hall New Jersey.  P Hersey and K H Blanchard. 1977. Management of Organizational Behavior: Utilizing Human Resources (3rd ed. ed.). Prentice Hall New Jersey."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.6.15"},{"key":"e_1_3_2_1_5_1","unstructured":"Alan McClean. 2015. An Exploration of the Use of Gamification in Agile Software Development. Ph.D. Dissertation. Technological University Dublin. http:\/\/arrow.dit.ie\/scschcomdis\/72  Alan McClean. 2015. An Exploration of the Use of Gamification in Agile Software Development. Ph.D. Dissertation. Technological University Dublin. http:\/\/arrow.dit.ie\/scschcomdis\/72"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/itms-2017-0010"},{"key":"e_1_3_2_1_7_1","unstructured":"Tuuli Siiskonen Camillo Sars Antti Vah Sipila and Ari Pietikain. 2014. Generic Security User Stories. In Handbook of the Secure Agile So\u00c5&pound;tware Development Life Cycle Pekka Pietikinen and Juha Rning (Eds.). University of Oulu Oulu 9--14.  Tuuli Siiskonen Camillo Sars Antti Vah Sipila and Ari Pietikain. 2014. Generic Security User Stories. In Handbook of the Secure Agile So\u00c5&pound;tware Development Life Cycle Pekka Pietikinen and Juha Rning (Eds.). University of Oulu Oulu 9--14."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/CMS-01-2017-0005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcis.2015.5101"},{"volume-title":"CEUR Workshop Proceedings 1977","year":"2017","author":"T\u00fcrpe Sven","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.22610\/imbr.v6i5.1123"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360728","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":11,"alternative-id":["10.1145\/3360664.3360728","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360728","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}