Changes
On August 4, 2023 at 8:46:17 AM UTC, admin:
-
Set author of Replication Package: "How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study" to Marco Gutfleisch (previously Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl)
f | 1 | { | f | 1 | { |
n | 2 | "author": "Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin | n | 2 | "author": "Marco Gutfleisch", |
3 | Acar, M. Angela Sasse, Sascha Fahl", | ||||
4 | "author_email": "marco.gutfleisch@ruhr-uni-bochum.de", | 3 | "author_email": "marco.gutfleisch@ruhr-uni-bochum.de", | ||
5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
6 | "doi": "10.25835/0089554", | 5 | "doi": "10.25835/0089554", | ||
7 | "doi_date_published": "2021-08-11", | 6 | "doi_date_published": "2021-08-11", | ||
8 | "doi_publisher": "LUIS", | 7 | "doi_publisher": "LUIS", | ||
9 | "doi_status": "true", | 8 | "doi_status": "true", | ||
10 | "domain": "https://data.uni-hannover.de", | 9 | "domain": "https://data.uni-hannover.de", | ||
n | n | 10 | "extra_authors": [ | ||
11 | { | ||||
12 | "extra_author": " Jan H. Klemmer" | ||||
13 | }, | ||||
14 | { | ||||
15 | "extra_author": " Niklas Busch" | ||||
16 | }, | ||||
17 | { | ||||
18 | "extra_author": " Yasemin Acar" | ||||
19 | }, | ||||
20 | { | ||||
21 | "extra_author": " M. Angela Sasse" | ||||
22 | }, | ||||
23 | { | ||||
24 | "extra_author": " Sascha Fahl" | ||||
25 | } | ||||
26 | ], | ||||
11 | "groups": [], | 27 | "groups": [], | ||
12 | "have_copyright": "Yes", | 28 | "have_copyright": "Yes", | ||
13 | "id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | 29 | "id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | ||
14 | "isopen": false, | 30 | "isopen": false, | ||
15 | "license_id": "CC-BY-SA-3.0", | 31 | "license_id": "CC-BY-SA-3.0", | ||
16 | "license_title": "CC-BY-SA-3.0", | 32 | "license_title": "CC-BY-SA-3.0", | ||
17 | "maintainer": "Marco Gutfleisch", | 33 | "maintainer": "Marco Gutfleisch", | ||
18 | "maintainer_email": "marco.gutfleisch@ruhr-uni-bochum.de", | 34 | "maintainer_email": "marco.gutfleisch@ruhr-uni-bochum.de", | ||
19 | "metadata_created": "2021-10-14T10:15:52.291375", | 35 | "metadata_created": "2021-10-14T10:15:52.291375", | ||
n | 20 | "metadata_modified": "2023-01-12T13:13:58.488062", | n | 36 | "metadata_modified": "2023-08-04T08:46:16.962844", |
21 | "name": "luh-2022-oakland-usec-in-sdps-replication", | 37 | "name": "luh-2022-oakland-usec-in-sdps-replication", | ||
22 | "notes": "Replication Package for the IEEE Symposium on Security and | 38 | "notes": "Replication Package for the IEEE Symposium on Security and | ||
23 | Privacy (Oakland '22) paper: \"How Does Usable Security (Not) End Up | 39 | Privacy (Oakland '22) paper: \"How Does Usable Security (Not) End Up | ||
24 | in Software Products? Results From a Qualitative Interview | 40 | in Software Products? Results From a Qualitative Interview | ||
25 | Study\"\r\n\r\nTo make our study reproducible and allow for easy | 41 | Study\"\r\n\r\nTo make our study reproducible and allow for easy | ||
26 | access for meta-research, we publish a replication package containing | 42 | access for meta-research, we publish a replication package containing | ||
27 | the following documents: \r\n(1) The pre-questionnaire for demographic | 43 | the following documents: \r\n(1) The pre-questionnaire for demographic | ||
28 | and quantitative questions; \r\n(2) The interview guide with the main | 44 | and quantitative questions; \r\n(2) The interview guide with the main | ||
29 | questions and follow-up prompts for the semi-structured interviews; | 45 | questions and follow-up prompts for the semi-structured interviews; | ||
30 | \r\n(3) The materials we used to contact and recruit participants; | 46 | \r\n(3) The materials we used to contact and recruit participants; | ||
31 | \r\n(4) The consent forms; \r\n(5) A table of the software used in | 47 | \r\n(4) The consent forms; \r\n(5) A table of the software used in | ||
32 | this study; \r\n(6) The operationalized codebook with codes | 48 | this study; \r\n(6) The operationalized codebook with codes | ||
33 | contributing to this paper.", | 49 | contributing to this paper.", | ||
34 | "num_resources": 1, | 50 | "num_resources": 1, | ||
35 | "num_tags": 7, | 51 | "num_tags": 7, | ||
36 | "organization": { | 52 | "organization": { | ||
37 | "approval_status": "approved", | 53 | "approval_status": "approved", | ||
38 | "created": "2021-10-14T10:15:52.219448", | 54 | "created": "2021-10-14T10:15:52.219448", | ||
n | 39 | "description": "https://www.pi.uni-hannover.de/de/sec/", | n | 55 | "description": "https://www.itsec.uni-hannover.de/de/eis/", |
40 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 56 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
41 | "image_url": "", | 57 | "image_url": "", | ||
42 | "is_organization": true, | 58 | "is_organization": true, | ||
n | 43 | "name": "fachgebiet-it-sicherheit", | n | 59 | "name": "fachgebiet-empirical-information-security", |
44 | "state": "active", | 60 | "state": "active", | ||
n | 45 | "title": "Fachgebiet IT-Sicherheit", | n | 61 | "title": "Fachgebiet Empirical Information Security", |
46 | "type": "organization" | 62 | "type": "organization" | ||
47 | }, | 63 | }, | ||
48 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 64 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
49 | "private": false, | 65 | "private": false, | ||
50 | "relationships_as_object": [], | 66 | "relationships_as_object": [], | ||
51 | "relationships_as_subject": [], | 67 | "relationships_as_subject": [], | ||
52 | "repository_name": "Leibniz University Hannover", | 68 | "repository_name": "Leibniz University Hannover", | ||
53 | "resources": [ | 69 | "resources": [ | ||
54 | { | 70 | { | ||
55 | "cache_last_updated": null, | 71 | "cache_last_updated": null, | ||
56 | "cache_url": null, | 72 | "cache_url": null, | ||
57 | "created": "2021-08-05T13:03:07.976834", | 73 | "created": "2021-08-05T13:03:07.976834", | ||
58 | "description": "", | 74 | "description": "", | ||
59 | "format": ".zip", | 75 | "format": ".zip", | ||
60 | "hash": "", | 76 | "hash": "", | ||
61 | "id": "7be231b6-c8f8-450e-864f-b4e651346446", | 77 | "id": "7be231b6-c8f8-450e-864f-b4e651346446", | ||
62 | "last_modified": "2021-08-05T13:03:07.932394", | 78 | "last_modified": "2021-08-05T13:03:07.932394", | ||
n | 63 | "metadata_modified": "2023-01-12T13:13:58.492738", | n | 79 | "metadata_modified": "2023-08-04T08:46:16.978100", |
64 | "mimetype": "application/zip", | 80 | "mimetype": "application/zip", | ||
65 | "mimetype_inner": null, | 81 | "mimetype_inner": null, | ||
66 | "name": "replication-package.zip", | 82 | "name": "replication-package.zip", | ||
67 | "package_id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | 83 | "package_id": "2ddc1f8f-bb4a-4c9e-ad4f-af551a6ecf54", | ||
68 | "position": 0, | 84 | "position": 0, | ||
69 | "resource_type": null, | 85 | "resource_type": null, | ||
70 | "size": 138896, | 86 | "size": 138896, | ||
71 | "state": "active", | 87 | "state": "active", | ||
72 | "url": | 88 | "url": | ||
73 | be231b6-c8f8-450e-864f-b4e651346446/download/replication-package.zip", | 89 | be231b6-c8f8-450e-864f-b4e651346446/download/replication-package.zip", | ||
74 | "url_type": "" | 90 | "url_type": "" | ||
75 | } | 91 | } | ||
76 | ], | 92 | ], | ||
t | t | 93 | "services_used_list": "", | ||
77 | "source_metadata_created": "2021-08-05T12:58:35.070910", | 94 | "source_metadata_created": "2021-08-05T12:58:35.070910", | ||
78 | "source_metadata_modified": "2022-01-20T10:58:43.250171", | 95 | "source_metadata_modified": "2022-01-20T10:58:43.250171", | ||
79 | "state": "active", | 96 | "state": "active", | ||
80 | "tags": [ | 97 | "tags": [ | ||
81 | { | 98 | { | ||
82 | "display_name": "development", | 99 | "display_name": "development", | ||
83 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | 100 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | ||
84 | "name": "development", | 101 | "name": "development", | ||
85 | "state": "active", | 102 | "state": "active", | ||
86 | "vocabulary_id": null | 103 | "vocabulary_id": null | ||
87 | }, | 104 | }, | ||
88 | { | 105 | { | ||
89 | "display_name": "interview", | 106 | "display_name": "interview", | ||
90 | "id": "6afe8cd6-5598-4d55-911c-9332475e7b4d", | 107 | "id": "6afe8cd6-5598-4d55-911c-9332475e7b4d", | ||
91 | "name": "interview", | 108 | "name": "interview", | ||
92 | "state": "active", | 109 | "state": "active", | ||
93 | "vocabulary_id": null | 110 | "vocabulary_id": null | ||
94 | }, | 111 | }, | ||
95 | { | 112 | { | ||
96 | "display_name": "processes", | 113 | "display_name": "processes", | ||
97 | "id": "6ab28979-4aa4-4efa-96b1-072ee68f7381", | 114 | "id": "6ab28979-4aa4-4efa-96b1-072ee68f7381", | ||
98 | "name": "processes", | 115 | "name": "processes", | ||
99 | "state": "active", | 116 | "state": "active", | ||
100 | "vocabulary_id": null | 117 | "vocabulary_id": null | ||
101 | }, | 118 | }, | ||
102 | { | 119 | { | ||
103 | "display_name": "replication", | 120 | "display_name": "replication", | ||
104 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | 121 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | ||
105 | "name": "replication", | 122 | "name": "replication", | ||
106 | "state": "active", | 123 | "state": "active", | ||
107 | "vocabulary_id": null | 124 | "vocabulary_id": null | ||
108 | }, | 125 | }, | ||
109 | { | 126 | { | ||
110 | "display_name": "security", | 127 | "display_name": "security", | ||
111 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | 128 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | ||
112 | "name": "security", | 129 | "name": "security", | ||
113 | "state": "active", | 130 | "state": "active", | ||
114 | "vocabulary_id": null | 131 | "vocabulary_id": null | ||
115 | }, | 132 | }, | ||
116 | { | 133 | { | ||
117 | "display_name": "software", | 134 | "display_name": "software", | ||
118 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | 135 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | ||
119 | "name": "software", | 136 | "name": "software", | ||
120 | "state": "active", | 137 | "state": "active", | ||
121 | "vocabulary_id": null | 138 | "vocabulary_id": null | ||
122 | }, | 139 | }, | ||
123 | { | 140 | { | ||
124 | "display_name": "usable security", | 141 | "display_name": "usable security", | ||
125 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | 142 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | ||
126 | "name": "usable security", | 143 | "name": "usable security", | ||
127 | "state": "active", | 144 | "state": "active", | ||
128 | "vocabulary_id": null | 145 | "vocabulary_id": null | ||
129 | } | 146 | } | ||
130 | ], | 147 | ], | ||
131 | "terms_of_usage": "Yes", | 148 | "terms_of_usage": "Yes", | ||
132 | "title": "Replication Package: \"How Does Usable Security (Not) End | 149 | "title": "Replication Package: \"How Does Usable Security (Not) End | ||
133 | Up in Software Products? Results From a Qualitative Interview | 150 | Up in Software Products? Results From a Qualitative Interview | ||
134 | Study\"", | 151 | Study\"", | ||
135 | "type": "vdataset", | 152 | "type": "vdataset", | ||
136 | "url": | 153 | "url": | ||
137 | //data.uni-hannover.de/dataset/2022-oakland-usec-in-sdps-replication", | 154 | //data.uni-hannover.de/dataset/2022-oakland-usec-in-sdps-replication", | ||
138 | "version": "1.0" | 155 | "version": "1.0" | ||
139 | } | 156 | } |