{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:42:21Z","timestamp":1759970541462,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Karl-Popper Kolleg SEEROSE (Responsible Safe and Secure Robotic Systems Engineering) at the University of Klagenfurt"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software"],"abstract":"<jats:p>The SOLID-S is an inventory assessing six dimensions of organizational (software) security culture, which is currently available in English. Here, we present the German version, SOLID-SD, along with its translation process and psychometric analysis. With a partial credit model based on a sample of N = 280 persons, we found, overall, highly satisfactory measurement properties for the instrument. There were no threshold permutations, no serious differential item functioning, and good item fits. The subscales\u2019 internal consistencies and the inter-scale correlations show very high similarities between the SOLID-SD and the original English version, indicating a successful translation of the instrument.<\/jats:p>","DOI":"10.3390\/software4010002","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T03:26:31Z","timestamp":1737689191000},"page":"2","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["German Translation and Psychometric Analysis of the SOLID-SD: A German Inventory for Assessing Security Culture in Software Companies"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3598-6212","authenticated-orcid":false,"given":"Christina","family":"Glasauer","sequence":"first","affiliation":[{"name":"Karl Popper Kolleg SEEROSE, University of Klagenfurt, 9020 Klagenfurt am Woerthersee, Carinthia, Austria"}]},{"given":"Hollie N.","family":"Pearl","sequence":"additional","affiliation":[{"name":"Department of Psychology, Faculty of Social Sciences, University of Klagenfurt, 9020 Klagenfurt am Woerthersee, Carinthia, Austria"}]},{"given":"Rainer W.","family":"Alexandrowicz","sequence":"additional","affiliation":[{"name":"Department of Psychology, Faculty of Social Sciences, University of Klagenfurt, 9020 Klagenfurt am Woerthersee, Carinthia, Austria"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"key":"ref_1","unstructured":"Statistik Austria (2024, February 08). IKT-Einsatz in Haushalten: Einsatz von Informations-und Kommunikationstechnologien in Haushalten 2020. [ICT Usage in Households: Usage of Information and Communication Technologies in Households 2020], Wien, 2022, Available online: https:\/\/www.statistik.at\/fileadmin\/publications\/IKT-Haushalte2020.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1109\/JBHI.2014.2344095","article-title":"Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare","volume":"19","author":"Raghunathan","year":"2015","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_3","unstructured":"Statistik Austria (2024, February 08). IKT-Einsatz in Unternehmen 2022: Einsatz von Informations- und Kommunikationstechnologien in Unternehmen 2022. [ICT Usage in Companies in 2022: Usage of Information and Communication Technologies in Companies in 2022], Wien, 2023, Available online: https:\/\/www.statistik.at\/fileadmin\/user_upload\/IKTU-2022_barr.pdf."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Anderson, R. (2020). Security Engineering\u2014A Guide to Building Dependable Distributed Systems, John Wiley & Sons. [3rd ed.].","DOI":"10.1002\/9781119644682"},{"key":"ref_5","unstructured":"Howard, M., and Lipner, S. (2006). The Security Development Lifecycle, Microsoft Press."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"111548","DOI":"10.1016\/j.jss.2022.111548","article-title":"The Prevent-Model: Human and Organizational Factors Fostering Engineering of Safe and Secure Robotic Systems","volume":"195","author":"Glasauer","year":"2023","journal-title":"J. Syst. Softw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1108\/CMS-01-2017-0005","article-title":"Promotion of secure software development assimilation: Stimulating individual motivation","volume":"12","author":"Song","year":"2018","journal-title":"Chin. Manag. Stud."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tahaei, M., and Vaniea, K. (2019, January 17\u201319). A Survey on Developer-Centred Security. Proceedings of the IEEE European Symposium on Security and Privacy Workshops, Stockholm, Sweden.","DOI":"10.1109\/EuroSPW.2019.00021"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Assal, H., and Chiasson, S. (2019, January 4\u20139). \u2018Think secure from the beginning\u2019: A Survey with Software Developers. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK.","DOI":"10.1145\/3290605.3300519"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"van der Kleij, R., van Hemert, D., Jan Te Paske, B., and Rooijakkers, T. (2024, January 8\u201310). Human-centric Security Engineering: Towards a Research Agenda. Proceedings of the Human Factors in Design, Engineering, and Computing 2024 AHFE International Conference on Human Factors in Design, Engineering, and Computing (AHFE 2024 Hawaii Edition), Honolulu, HI, USA.","DOI":"10.54941\/ahfe1005596"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"103753","DOI":"10.1016\/j.cose.2024.103753","article-title":"Development & Psychometrics of the SOLID-S\u2014An Inventory Assessing Software Security Culture in Software Development Companies","volume":"140","author":"Glasauer","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_12","unstructured":"Mitre Cooperation (2024, February 08). CVE-Common Vulnerabilities and Exposures. Available online: www.cve.org\/About\/Metrics."},{"key":"ref_13","unstructured":"Assal, H., and Chiasson, S. (2018, January 12\u201314). Motivations and Amotivations for Software Security. Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Oliveira, D., Rosenthal, M., Morin, N., Yeh, K.-C., Cappos, J., and Zhuang, Y. (2014, January 8\u201312). It\u2019s the Psychology Stupid: How Heuristics Explain Software Vulnerabilities and How Priming Can Illuminate Developer\u2019s Blind Spots. Proceedings of the 30th Annual Computer Security Applications Conference on-ACSAC\u201914, New Orleans, LA, USA.","DOI":"10.1145\/2664243.2664254"},{"key":"ref_15","unstructured":"Assal, H., and Chiasson, S. (2018). Security in the Software Development Lifecycle. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, USA, 12\u201314 August 2018, USENIX Association."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Tomas, N., Li, J., and Huang, H. (2019, January 3\u20134). An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK.","DOI":"10.1109\/CyberSecPODS.2019.8884935"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1026\/0012-1924.53.1.1","article-title":"Richtlinien f\u00fcr die \u00dcbersetzung fremdsprachlicher Messinstrumente: [Guidelines for Translating Foreign-Language Measurement Instruments]","volume":"53","author":"Schmitt","year":"2007","journal-title":"Diagnostica"},{"key":"ref_18","unstructured":"Limesurvey GmbH (2022). LimeSurvey: An Open Source Survey Tool, Limesurvey GmbH. Available online: http:\/\/www.limesurvey.org."},{"key":"ref_19","unstructured":"Prolific Academic Ltd. (2025, January 21). Prolific (Version February 2023). Available online: https:\/\/www.prolific.co."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BF02296272","article-title":"A Rasch Model for Partial Credit Scoring","volume":"47","author":"Masters","year":"1982","journal-title":"Psychometrika"},{"key":"ref_21","first-page":"26","article-title":"CML based estimation of extended Rasch models with the eRm package in R","volume":"49","author":"Mair","year":"2007","journal-title":"Psychol. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fischer, G.H., and Molenaar, I.W. (1995). Rasch Models: Foundations, Recent Developments, and Applications, Springer.","DOI":"10.1007\/978-1-4612-4230-7"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF02291180","article-title":"A goodness of fit test for the Rasch model","volume":"38","author":"Andersen","year":"1973","journal-title":"Psychometrika"},{"key":"ref_24","unstructured":"Draxler, C., and Kurz, A. (2023, November 10). Tcl: Testing in Conditional Likelihood Context. Available online: https:\/\/CRAN.R-project.org\/package=tcl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Fischer, G.H., and Molenaar, I.W. (1995). Testing the Rasch Model. Rasch Models: Foundations, Recent Developments, and Applications, Springer.","DOI":"10.1007\/978-1-4612-4230-7"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1017\/S0305004100023987","article-title":"Large sample tests of statistical hypotheses concerning several parameters with applications to problems of estimation","volume":"44","author":"Rao","year":"1948","journal-title":"Math. Proc. Camb. Philos. Soc."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Schumacker, R.E., and Lomax, R.G. (2004). A Beginner\u2019s Guide to Structural Equation Modeling, Psychology Press. [2nd ed.].","DOI":"10.4324\/9781410610904"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Smith, A.B., Rush, R., Fallowfield, L.J., Velikova, G., and Sharpe, M. (2008). Rasch fit statistics and sample size considerations for polytomous data. BMC Med. Res. Methodol., 8.","DOI":"10.1186\/1471-2288-8-33"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1177\/0146621616677520","article-title":"Critical Values for Yen\u2019s Q3: Identification of Local Dependence in the Rasch Model Using Residual Correlations","volume":"41","author":"Christensen","year":"2017","journal-title":"Appl. Psychol. Meas."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Marais, I. (2013). Local Dependence. Rasch Models in Health, John Wiley & Sons, Inc.","DOI":"10.1002\/9781118574454.ch7"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/BF02293814","article-title":"A rating formulation for ordered response categories","volume":"43","author":"Andrich","year":"1978","journal-title":"Psychometrika"},{"key":"ref_32","unstructured":"R Core Team (2022). R: A Language and Environment for Statistical Computing: R Version 4.2.2, R Foundation for Statistical Computing. Available online: https:\/\/www.R-project.org\/."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v020.i09","article-title":"Extended Rasch modeling: The eRm package for the application of IRT models in R","volume":"20","author":"Mair","year":"2007","journal-title":"J. Stat. Softw."},{"key":"ref_34","unstructured":"Mair, P., Hatzinger, R., and Maier, M.J. (2025, January 21). eRm: Extended Rasch Modeling. Available online: https:\/\/cran.r-project.org\/package=eRm."},{"key":"ref_35","unstructured":"Revelle, W. (2022). Psych: Procedures for Psychological, Psychometric, and Personality Research, Northwestern University. Available online: https:\/\/CRAN.R-project.org\/package=psych."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"948","DOI":"10.3390\/psych5030062","article-title":"RMX\/PIccc: An Extended Person-Item Map and a Unified IRT Output for eRm, psychotools, ltm, mirt, and TAM","volume":"5","author":"Kabic","year":"2023","journal-title":"Psych"},{"key":"ref_37","first-page":"259","article-title":"Extending GMX: Conditional Likelihood Ratio Test and Extended Graphical Model Checks with psychotools","volume":"65","author":"Alexandrowicz","year":"2023","journal-title":"Psychol. Test Assess. Model."},{"key":"ref_38","first-page":"215","article-title":"GMX: Extended Graphical Model Checks. A Versatile Replacement of the plotGOF Function of eRm","volume":"64","author":"Alexandrowicz","year":"2022","journal-title":"Psychol. Test Assess. Model."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1177\/014662168701100107","article-title":"Statistical Inference for Coefficient Alpha","volume":"11","author":"Feldt","year":"1987","journal-title":"Appl. Psychol. Meas."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"773","DOI":"10.2307\/256568","article-title":"Interaction Patterns in Organic and Mechanistic Systems","volume":"32","author":"Courtright","year":"1989","journal-title":"Acad. Manag. J."},{"key":"ref_41","unstructured":"Robbins, S., and Judge, T. (2021). Essentials of Organizational Behaviour, Pearson Deutschland. [15th ed.]."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"559","DOI":"10.5840\/beq200616449","article-title":"Self-Selection Bias in Business Ethics Research","volume":"16","author":"James","year":"2006","journal-title":"Bus. Ethics Q."}],"container-title":["Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2674-113X\/4\/1\/2\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:35:05Z","timestamp":1759919705000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2674-113X\/4\/1\/2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,24]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["software4010002"],"URL":"https:\/\/doi.org\/10.3390\/software4010002","relation":{},"ISSN":["2674-113X"],"issn-type":[{"type":"electronic","value":"2674-113X"}],"subject":[],"published":{"date-parts":[[2025,1,24]]}}}