{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:55:08Z","timestamp":1767084908622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS1271K"],"award-info":[{"award-number":["16KIS1271K"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3688459.3688463","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T08:31:55Z","timestamp":1732091515000},"page":"187-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6545-7513","authenticated-orcid":false,"given":"Julia","family":"Wunder","sequence":"first","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Erlangen, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0573-3797","authenticated-orcid":false,"given":"Janik","family":"Aurich","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Erlangen, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7158-0219","authenticated-orcid":false,"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg, Erlangen, Germany,"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Mathematical Methods of Statistics","author":"Cram\u00e9r Harald","year":"1999","unstructured":"Harald Cram\u00e9r. 1999. Mathematical Methods of Statistics. Princeton University Press."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380078"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.69"},{"key":"e_1_3_3_2_5_2","volume-title":"Proceedings of the FIRST 2008 Conference-Forum of Incident Response and Security Teams","author":"Fenz Stefan","year":"2008","unstructured":"Stefan Fenz, Andreas Ekelhart, and Edgar Weippl. 2008. Semantic potential of existing security advisory standards. In Proceedings of the FIRST 2008 Conference-Forum of Incident Response and Security Teams."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Spencer\u00a0E Harpe. 2015. How to analyze Likert and other rating scale data. Currents in pharmacy teaching and learning 7 6 (2015) 836\u2013850.","DOI":"10.1016\/j.cptl.2015.08.001"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00015"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Raula\u00a0Gaikovina Kula Daniel\u00a0M German Ali Ouni Takashi Ishio and Katsuro Inoue. 2018. Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration. Empirical Software Engineering 23 (2018) 384\u2013417.","DOI":"10.1007\/s10664-017-9521-5"},{"key":"e_1_3_3_2_9_2","first-page":"273","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Li Frank","year":"2019","unstructured":"Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, and Marshini Chetty. 2019. Keepers of the machines: Examining how system administrators manage software updates for multiple machines. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 273\u2013288."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on Human-Computer Interaction 3 (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Lucas Miranda Daniel Vieira Leandro\u00a0Pfleger de Aguiar Daniel\u00a0Sadoc Menasch\u00e9 Miguel\u00a0Angelo Bicudo Mateus\u00a0Schulz Nogueira Matheus Martins Leonardo Ventura Lucas Senos and Enrico Lovat. 2021. On the flow of software security advisories. IEEE Transactions on Network and Service Management 18 2 (2021) 1305\u20131320.","DOI":"10.1109\/TNSM.2021.3078727"},{"key":"e_1_3_3_2_12_2","unstructured":"OASIS. 2022. Common Security Advisory Framework Version 2.0 7.2.3 Role: CSAF trusted provider. https:\/\/docs.oasis-open.org\/csaf\/csaf\/v2.0\/os\/csaf-v2.0-os.html#723-role-csaf-trusted-provider Accessed in July 2024."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3021460.3021482"},{"key":"e_1_3_3_2_14_2","unstructured":"Statista. 2023. Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2023 with forecasts from 2022 to 2030. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/ Accessed in March 2024."},{"key":"e_1_3_3_2_15_2","first-page":"239","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Tiefenau Christian","year":"2020","unstructured":"Christian Tiefenau, Maximilian H\u00e4ring, Katharina Krombholz, and Emanuel Von\u00a0Zezschwitz. 2020. Security, availability, and multiple information sources: Exploring update behavior of system administrators. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 239\u2013258."}],"event":{"name":"EuroUSEC 2024: The 2024 European Symposium on Usable Security","acronym":"EuroUSEC 2024","location":"Karlstad Sweden"},"container-title":["Proceedings of the 2024 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688459.3688463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:29Z","timestamp":1750295429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":14,"alternative-id":["10.1145\/3688459.3688463","10.1145\/3688459"],"URL":"https:\/\/doi.org\/10.1145\/3688459.3688463","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}