Changes
On January 12, 2023 at 1:13:58 PM UTC, admin:
-
Changed value of field
source_metadata_modified
to2022-01-20T10:58:43.250171
in Replication Package: "How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study" -
Deleted resource All resource data from Replication Package: "How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"
-
Removed field
datastore_active
from resource replication-package.zip in Replication Package: "How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"
f | 1 | { | f | 1 | { |
2 | "author": "Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin | 2 | "author": "Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin | ||
3 | Acar, M. Angela Sasse, Sascha Fahl", | 3 | Acar, M. Angela Sasse, Sascha Fahl", | ||
4 | "author_email": "marco.gutfleisch@ruhr-uni-bochum.de", | 4 | "author_email": "marco.gutfleisch@ruhr-uni-bochum.de", | ||
5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
6 | "doi": "10.25835/0089554", | 6 | "doi": "10.25835/0089554", | ||
7 | "doi_date_published": "2021-08-11", | 7 | "doi_date_published": "2021-08-11", | ||
8 | "doi_publisher": "LUIS", | 8 | "doi_publisher": "LUIS", | ||
9 | "doi_status": "true", | 9 | "doi_status": "true", | ||
10 | "domain": "https://data.uni-hannover.de", | 10 | "domain": "https://data.uni-hannover.de", | ||
11 | "groups": [], | 11 | "groups": [], | ||
12 | "have_copyright": "Yes", | 12 | "have_copyright": "Yes", | ||
13 | "id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | 13 | "id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | ||
14 | "isopen": false, | 14 | "isopen": false, | ||
15 | "license_id": "CC-BY-SA-3.0", | 15 | "license_id": "CC-BY-SA-3.0", | ||
16 | "license_title": "CC-BY-SA-3.0", | 16 | "license_title": "CC-BY-SA-3.0", | ||
17 | "maintainer": "Marco Gutfleisch", | 17 | "maintainer": "Marco Gutfleisch", | ||
18 | "maintainer_email": "marco.gutfleisch@ruhr-uni-bochum.de", | 18 | "maintainer_email": "marco.gutfleisch@ruhr-uni-bochum.de", | ||
19 | "metadata_created": "2021-10-14T10:15:52.291375", | 19 | "metadata_created": "2021-10-14T10:15:52.291375", | ||
n | 20 | "metadata_modified": "2021-10-14T10:15:52.291380", | n | 20 | "metadata_modified": "2023-01-12T13:13:58.488062", |
21 | "name": "luh-2022-oakland-usec-in-sdps-replication", | 21 | "name": "luh-2022-oakland-usec-in-sdps-replication", | ||
22 | "notes": "Replication Package for the IEEE Symposium on Security and | 22 | "notes": "Replication Package for the IEEE Symposium on Security and | ||
23 | Privacy (Oakland '22) paper: \"How Does Usable Security (Not) End Up | 23 | Privacy (Oakland '22) paper: \"How Does Usable Security (Not) End Up | ||
24 | in Software Products? Results From a Qualitative Interview | 24 | in Software Products? Results From a Qualitative Interview | ||
25 | Study\"\r\n\r\nTo make our study reproducible and allow for easy | 25 | Study\"\r\n\r\nTo make our study reproducible and allow for easy | ||
26 | access for meta-research, we publish a replication package containing | 26 | access for meta-research, we publish a replication package containing | ||
27 | the following documents: \r\n(1) The pre-questionnaire for demographic | 27 | the following documents: \r\n(1) The pre-questionnaire for demographic | ||
28 | and quantitative questions; \r\n(2) The interview guide with the main | 28 | and quantitative questions; \r\n(2) The interview guide with the main | ||
29 | questions and follow-up prompts for the semi-structured interviews; | 29 | questions and follow-up prompts for the semi-structured interviews; | ||
30 | \r\n(3) The materials we used to contact and recruit participants; | 30 | \r\n(3) The materials we used to contact and recruit participants; | ||
31 | \r\n(4) The consent forms; \r\n(5) A table of the software used in | 31 | \r\n(4) The consent forms; \r\n(5) A table of the software used in | ||
32 | this study; \r\n(6) The operationalized codebook with codes | 32 | this study; \r\n(6) The operationalized codebook with codes | ||
33 | contributing to this paper.", | 33 | contributing to this paper.", | ||
n | 34 | "num_resources": 2, | n | 34 | "num_resources": 1, |
35 | "num_tags": 7, | 35 | "num_tags": 7, | ||
36 | "organization": { | 36 | "organization": { | ||
37 | "approval_status": "approved", | 37 | "approval_status": "approved", | ||
38 | "created": "2021-10-14T10:15:52.219448", | 38 | "created": "2021-10-14T10:15:52.219448", | ||
39 | "description": "https://www.pi.uni-hannover.de/de/sec/", | 39 | "description": "https://www.pi.uni-hannover.de/de/sec/", | ||
40 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 40 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
41 | "image_url": "", | 41 | "image_url": "", | ||
42 | "is_organization": true, | 42 | "is_organization": true, | ||
43 | "name": "fachgebiet-it-sicherheit", | 43 | "name": "fachgebiet-it-sicherheit", | ||
44 | "state": "active", | 44 | "state": "active", | ||
45 | "title": "Fachgebiet IT-Sicherheit", | 45 | "title": "Fachgebiet IT-Sicherheit", | ||
46 | "type": "organization" | 46 | "type": "organization" | ||
47 | }, | 47 | }, | ||
48 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 48 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
49 | "private": false, | 49 | "private": false, | ||
50 | "relationships_as_object": [], | 50 | "relationships_as_object": [], | ||
51 | "relationships_as_subject": [], | 51 | "relationships_as_subject": [], | ||
52 | "repository_name": "Leibniz University Hannover", | 52 | "repository_name": "Leibniz University Hannover", | ||
53 | "resources": [ | 53 | "resources": [ | ||
54 | { | 54 | { | ||
55 | "cache_last_updated": null, | 55 | "cache_last_updated": null, | ||
56 | "cache_url": null, | 56 | "cache_url": null, | ||
n | 57 | "created": "2021-08-05T12:58:49.991637", | n | ||
58 | "datastore_active": false, | ||||
59 | "description": "", | ||||
60 | "downloadall_datapackage_hash": | ||||
61 | "4e63a746a5f98ff6457d4b7622229070", | ||||
62 | "downloadall_metadata_modified": "2021-08-11T19:15:46.455552", | ||||
63 | "format": "ZIP", | ||||
64 | "hash": "", | ||||
65 | "id": "13504c76-2a46-4cdd-9c6a-51dd9ae7661b", | ||||
66 | "last_modified": "2021-08-11T19:15:49.695466", | ||||
67 | "metadata_modified": "2021-10-14T10:15:52.277503", | ||||
68 | "mimetype": "application/zip", | ||||
69 | "mimetype_inner": null, | ||||
70 | "name": "All resource data", | ||||
71 | "package_id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | ||||
72 | "position": 0, | ||||
73 | "resource_type": null, | ||||
74 | "revision_id": "7ff4076f-228d-4882-b71b-f1ee141af694", | ||||
75 | "size": 599, | ||||
76 | "state": "active", | ||||
77 | "url": | ||||
78 | dd9ae7661b/download/2022-oakland-usec-in-sdps-replication-psh4yf.zip", | ||||
79 | "url_type": "" | ||||
80 | }, | ||||
81 | { | ||||
82 | "cache_last_updated": null, | ||||
83 | "cache_url": null, | ||||
84 | "created": "2021-08-05T13:03:07.976834", | 57 | "created": "2021-08-05T13:03:07.976834", | ||
n | 85 | "datastore_active": false, | n | ||
86 | "description": "", | 58 | "description": "", | ||
87 | "format": ".zip", | 59 | "format": ".zip", | ||
88 | "hash": "", | 60 | "hash": "", | ||
89 | "id": "7be231b6-c8f8-450e-864f-b4e651346446", | 61 | "id": "7be231b6-c8f8-450e-864f-b4e651346446", | ||
90 | "last_modified": "2021-08-05T13:03:07.932394", | 62 | "last_modified": "2021-08-05T13:03:07.932394", | ||
n | 91 | "metadata_modified": "2021-10-14T10:15:52.278784", | n | 63 | "metadata_modified": "2023-01-12T13:13:58.492738", |
92 | "mimetype": "application/zip", | 64 | "mimetype": "application/zip", | ||
93 | "mimetype_inner": null, | 65 | "mimetype_inner": null, | ||
94 | "name": "replication-package.zip", | 66 | "name": "replication-package.zip", | ||
95 | "package_id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | 67 | "package_id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | ||
n | 96 | "position": 1, | n | 68 | "position": 0, |
97 | "resource_type": null, | 69 | "resource_type": null, | ||
n | 98 | "revision_id": "9bc96d00-2db0-45d8-9574-354b7b53fd5f", | n | ||
99 | "size": 138896, | 70 | "size": 138896, | ||
100 | "state": "active", | 71 | "state": "active", | ||
101 | "url": | 72 | "url": | ||
102 | be231b6-c8f8-450e-864f-b4e651346446/download/replication-package.zip", | 73 | be231b6-c8f8-450e-864f-b4e651346446/download/replication-package.zip", | ||
103 | "url_type": "" | 74 | "url_type": "" | ||
104 | } | 75 | } | ||
105 | ], | 76 | ], | ||
106 | "source_metadata_created": "2021-08-05T12:58:35.070910", | 77 | "source_metadata_created": "2021-08-05T12:58:35.070910", | ||
t | 107 | "source_metadata_modified": "2021-08-11T19:15:49.846349", | t | 78 | "source_metadata_modified": "2022-01-20T10:58:43.250171", |
108 | "state": "active", | 79 | "state": "active", | ||
109 | "tags": [ | 80 | "tags": [ | ||
110 | { | 81 | { | ||
111 | "display_name": "development", | 82 | "display_name": "development", | ||
112 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | 83 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | ||
113 | "name": "development", | 84 | "name": "development", | ||
114 | "state": "active", | 85 | "state": "active", | ||
115 | "vocabulary_id": null | 86 | "vocabulary_id": null | ||
116 | }, | 87 | }, | ||
117 | { | 88 | { | ||
118 | "display_name": "interview", | 89 | "display_name": "interview", | ||
119 | "id": "6afe8cd6-5598-4d55-911c-9332475e7b4d", | 90 | "id": "6afe8cd6-5598-4d55-911c-9332475e7b4d", | ||
120 | "name": "interview", | 91 | "name": "interview", | ||
121 | "state": "active", | 92 | "state": "active", | ||
122 | "vocabulary_id": null | 93 | "vocabulary_id": null | ||
123 | }, | 94 | }, | ||
124 | { | 95 | { | ||
125 | "display_name": "processes", | 96 | "display_name": "processes", | ||
126 | "id": "6ab28979-4aa4-4efa-96b1-072ee68f7381", | 97 | "id": "6ab28979-4aa4-4efa-96b1-072ee68f7381", | ||
127 | "name": "processes", | 98 | "name": "processes", | ||
128 | "state": "active", | 99 | "state": "active", | ||
129 | "vocabulary_id": null | 100 | "vocabulary_id": null | ||
130 | }, | 101 | }, | ||
131 | { | 102 | { | ||
132 | "display_name": "replication", | 103 | "display_name": "replication", | ||
133 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | 104 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | ||
134 | "name": "replication", | 105 | "name": "replication", | ||
135 | "state": "active", | 106 | "state": "active", | ||
136 | "vocabulary_id": null | 107 | "vocabulary_id": null | ||
137 | }, | 108 | }, | ||
138 | { | 109 | { | ||
139 | "display_name": "security", | 110 | "display_name": "security", | ||
140 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | 111 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | ||
141 | "name": "security", | 112 | "name": "security", | ||
142 | "state": "active", | 113 | "state": "active", | ||
143 | "vocabulary_id": null | 114 | "vocabulary_id": null | ||
144 | }, | 115 | }, | ||
145 | { | 116 | { | ||
146 | "display_name": "software", | 117 | "display_name": "software", | ||
147 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | 118 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | ||
148 | "name": "software", | 119 | "name": "software", | ||
149 | "state": "active", | 120 | "state": "active", | ||
150 | "vocabulary_id": null | 121 | "vocabulary_id": null | ||
151 | }, | 122 | }, | ||
152 | { | 123 | { | ||
153 | "display_name": "usable security", | 124 | "display_name": "usable security", | ||
154 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | 125 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | ||
155 | "name": "usable security", | 126 | "name": "usable security", | ||
156 | "state": "active", | 127 | "state": "active", | ||
157 | "vocabulary_id": null | 128 | "vocabulary_id": null | ||
158 | } | 129 | } | ||
159 | ], | 130 | ], | ||
160 | "terms_of_usage": "Yes", | 131 | "terms_of_usage": "Yes", | ||
161 | "title": "Replication Package: \"How Does Usable Security (Not) End | 132 | "title": "Replication Package: \"How Does Usable Security (Not) End | ||
162 | Up in Software Products? Results From a Qualitative Interview | 133 | Up in Software Products? Results From a Qualitative Interview | ||
163 | Study\"", | 134 | Study\"", | ||
164 | "type": "vdataset", | 135 | "type": "vdataset", | ||
165 | "url": | 136 | "url": | ||
166 | //data.uni-hannover.de/dataset/2022-oakland-usec-in-sdps-replication", | 137 | //data.uni-hannover.de/dataset/2022-oakland-usec-in-sdps-replication", | ||
167 | "version": "1.0" | 138 | "version": "1.0" | ||
168 | } | 139 | } |