{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:02Z","timestamp":1750220642514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009526","name":"Univerza v Mariboru","doi-asserted-by":"publisher","award":["Human factors in cybersecurity and digital forensics"],"award-info":[{"award-number":["Human factors in cybersecurity and digital forensics"]}],"id":[{"id":"10.13039\/501100009526","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424964","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach for Acquiring Training and Software Security Requirements"],"prefix":"10.1145","author":[{"given":"Damjan","family":"Fujs","sequence":"first","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]},{"given":"Simon","family":"Vrhovec","sequence":"additional","affiliation":[{"name":"University of Maribor, Ljubljana, Slovenia"}]},{"given":"Damjan","family":"Vavpoti\u010d","sequence":"additional","affiliation":[{"name":"University of Ljubljana, Ljubljana, Slovenia"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"764","article-title":"Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations","volume":"25","author":"Macasaet RJ","year":"2019","unstructured":"RJ Macasaet , Manuel Noguera , Maria Luisa Rodr\u00edguez , Jos\u00e9 Luis Garrido , Sam Supakkul , and Lawrence Chung . 2019 . Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations . Journal of Universal Computer Science 25 , 7 (2019), 764 -- 787 . https:\/\/doi.org\/10.3217\/jucs-025-07-0764 10.3217\/jucs-025-07-0764 RJ Macasaet, Manuel Noguera, Maria Luisa Rodr\u00edguez, Jos\u00e9 Luis Garrido, Sam Supakkul, and Lawrence Chung. 2019. Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations. Journal of Universal Computer Science 25, 7 (2019), 764--787. https:\/\/doi.org\/10.3217\/jucs-025-07-0764","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_2_1","first-page":"1148","article-title":"Testing the human backdoor: Organizational response to a phishing campaign","volume":"25","author":"Miheli\u010d An\u017ee","year":"2019","unstructured":"An\u017ee Miheli\u010d , Matej Jev\u0161\u010dek , Simon Vrhovec , and Igor Bernik . 2019 . Testing the human backdoor: Organizational response to a phishing campaign . Journal of Universal Computer Science 25 , 11 (2019), 1148 -- 1477 . https:\/\/doi.org\/10.3217\/jucs-025-11-1458 10.3217\/jucs-025-11-1458 An\u017ee Miheli\u010d, Matej Jev\u0161\u010dek, Simon Vrhovec, and Igor Bernik. 2019. Testing the human backdoor: Organizational response to a phishing campaign. Journal of Universal Computer Science 25, 11 (2019), 1148--1477. https:\/\/doi.org\/10.3217\/jucs-025-11-1458","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_3_1","first-page":"1690","article-title":"Software Quality Issues in SCRUM: A Systematic Mapping","volume":"24","author":"Mishra Deepti","year":"2019","unstructured":"Deepti Mishra and Samia Abdalhamid . 2019 . Software Quality Issues in SCRUM: A Systematic Mapping . Journal of Universal Computer Science 24 , 12 (2019), 1690 -- 1716 . https:\/\/doi.org\/10.3217\/jucs-024-12-1690 10.3217\/jucs-024-12-1690 Deepti Mishra and Samia Abdalhamid. 2019. Software Quality Issues in SCRUM: A Systematic Mapping. Journal of Universal Computer Science 24, 12 (2019), 1690--1716. https:\/\/doi.org\/10.3217\/jucs-024-12-1690","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101852"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_1_6_1","volume-title":"Personalising Security Education: Factors Influencing Individual Awareness and AC. In Information Systems Security and Privacy: 4th International Conference, ICISSP","author":"Vasileiou Ismini","year":"2019","unstructured":"Ismini Vasileiou and Steven Furnell . 2019 . Personalising Security Education: Factors Influencing Individual Awareness and AC. In Information Systems Security and Privacy: 4th International Conference, ICISSP 2018. Springer, Funchal, Madeira, Portugal, 315--321. Ismini Vasileiou and Steven Furnell. 2019. Personalising Security Education: Factors Influencing Individual Awareness and AC. In Information Systems Security and Privacy: 4th International Conference, ICISSP 2018. Springer, Funchal, Madeira, Portugal, 315--321."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987964"}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2020","location":"Rennes France"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:09Z","timestamp":1750197729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":7,"alternative-id":["10.1145\/3424954.3424964","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424964","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}