{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:06:15Z","timestamp":1755907575491,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/P011454\/1"],"award-info":[{"award-number":["EP\/P011454\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3561145","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development"],"prefix":"10.1145","author":[{"given":"Debi","family":"Ashenden","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Adelaide, Australia and School of Computing, University of Portsmouth, United Kingdom"}]},{"given":"Gail","family":"Ollis","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth, United Kingdom"}]},{"given":"Iain","family":"Reid","sequence":"additional","affiliation":[{"name":"School of Criminology &amp; Criminal Justice, University of Portsmouth, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.57"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442167.3442178"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300519"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2125.2007.02971_1.x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1704846"},{"volume-title":"Concordance","author":"Britten Nicky","key":"e_1_3_2_1_9_1","unstructured":"Nicky Britten. 2014. Concordance. In The Wiley Blackwell encyclopedia of health, illness, behavior and society. 299\u2013302."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of NordiCHI","author":"B\u00f8dker Susanne","year":"2000","unstructured":"Susanne B\u00f8dker, Pelle Ehn, Dan Sj\u00f6gren, and Yngve Sundblad. 2000. Co-operative Design \u2014 perspectives on 20 years with \u2018the Scandinavian IT Design Model\u2019. In Proceedings of NordiCHI 2000. Stockholm, 12."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Raffaele\u00a0Fabio Ciriello Alexander Richter and Gerhard Schwabe. 2017. When Prototyping Meets Storytelling: Practices and Malpractices in Innovating Software Firms. In 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP). 163\u2013172. https:\/\/doi.org\/10.1109\/ICSE-SEIP.2017.24","DOI":"10.1109\/ICSE-SEIP.2017.24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376214"},{"key":"e_1_3_2_1_13_1","first-page":"6","article-title":"Optimizing medicines management: From compliance to concordance","volume":"3","author":"Cushing Annie","year":"2007","unstructured":"Annie Cushing and Richard Metcalfe. 2007. Optimizing medicines management: From compliance to concordance. Therapeutics and Clinical Risk Management 3, 6 (Dec. 2007), 1047\u20131058.","journal-title":"Therapeutics and Clinical Risk Management"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380387"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.001"},{"key":"e_1_3_2_1_16_1","unstructured":"S. Dodier-Lazaro R. Abu-Salma I. Becker and M.\u00a0A. Sasse. 2017. From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design. http:\/\/www.valuesincomputing.org\/position-papers\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_18_1","volume-title":"Exploring medication use to seek concordance with \u2018non-adherent","author":"Dowell Jon","year":"2002","unstructured":"Jon Dowell, Anni Jones, and David Snadden. 2002. Exploring medication use to seek concordance with \u2018non-adherent\u2019 patients: a qualitative study. British Journal of General Practice(2002), 9."},{"volume-title":"Philosophical Medical Ethics","author":"Gillon Raanan","key":"e_1_3_2_1_19_1","unstructured":"Raanan Gillon. 1985. Philosophical Medical Ethics. John Wiley &Sons, Chichester ; New York."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376142"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.111"},{"volume-title":"Applied Thematic Analysis","author":"Guest Greg","key":"e_1_3_2_1_22_1","unstructured":"Greg Guest, Kathleen\u00a0M. MacQueen, and Emily\u00a0E. Namey. 2011. Applied Thematic Analysis. SAGE Publications. Google-Books-ID: Hr11DwAAQBAJ."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.12968\/bjcn.2006.11.6.21221"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/1049732315617444"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1474-7766.2005.00313.x"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/104973200129118183"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998191"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Andreas Poller Laura Kocksch Sven T\u00fcrpe Felix\u00a0Anand Epp and Katharina Kinder-Kurlanda. 2017. Can Security Become a Routine? A Study of Organizational Change in an Agile Software Development Group. ACM 2489.","DOI":"10.1145\/2998181.2998191"},{"key":"e_1_3_2_1_30_1","volume-title":"The Dewald Roode workshop in information systems security (Sept.","author":"Courtney P. B.","year":"2011","unstructured":"Posey, C., Roberts, T., Lowry, P. B., Courtney, J., and Bennett, B.2011. Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations. The Dewald Roode workshop in information systems security (Sept. 2011), 1\u201351. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2273594"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.11.012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.12968\/jprp.2021.3.6.235"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471930"},{"key":"e_1_3_2_1_34_1","unstructured":"S. Rollnick P. Mason and C. Butler. 2000. Health behavior change: a guide for practitioners.Churchill Livingstone London."},{"key":"e_1_3_2_1_35_1","unstructured":"Royal Society. 2015. Robotics and autonomous systems \u2013 visions challenges and actions. Technical Report. Royal Society. https:\/\/royalsociety.org\/\u00a0\/media\/events\/2015\/11\/robotics\/Robotics%20conference%20report.pdf?la=en-GB"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2519887"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2018.1454643"},{"key":"e_1_3_2_1_38_1","unstructured":"Sven T\u00fcrpe Laura Kocksch and Andreas Poller. 2016. Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team. https:\/\/www.usenix.org\/conference\/soups2016\/workshop-program\/wsiw16\/presentation\/turpe"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2774"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","acronym":"ASE '22","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:53:17Z","timestamp":1755849197000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":41,"alternative-id":["10.1145\/3551349.3561145","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3561145","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}