Changes
On August 4, 2023 at 8:46:17 AM UTC, admin:
-
Set author of Replication Package: "Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples" to Harjot Kaur (previously Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, Sascha Fahl)
f | 1 | { | f | 1 | { |
n | 2 | "author": "Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, | n | 2 | "author": "Harjot Kaur", |
3 | Sascha Fahl", | ||||
4 | "author_email": "kaur@sec.uni-hannover.de", | 3 | "author_email": "kaur@sec.uni-hannover.de", | ||
5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
6 | "doi": "10.25835/wg7xhqmh", | 5 | "doi": "10.25835/wg7xhqmh", | ||
7 | "doi_date_published": "2022-06-14", | 6 | "doi_date_published": "2022-06-14", | ||
8 | "doi_publisher": "LUIS", | 7 | "doi_publisher": "LUIS", | ||
9 | "doi_status": "true", | 8 | "doi_status": "true", | ||
10 | "domain": "https://data.uni-hannover.de", | 9 | "domain": "https://data.uni-hannover.de", | ||
n | n | 10 | "extra_authors": [ | ||
11 | { | ||||
12 | "extra_author": " Sabrina Amft" | ||||
13 | }, | ||||
14 | { | ||||
15 | "extra_author": " Daniel Votipka" | ||||
16 | }, | ||||
17 | { | ||||
18 | "extra_author": " Yasemin Acar" | ||||
19 | }, | ||||
20 | { | ||||
21 | "extra_author": " Sascha Fahl" | ||||
22 | } | ||||
23 | ], | ||||
11 | "groups": [], | 24 | "groups": [], | ||
12 | "have_copyright": "Yes", | 25 | "have_copyright": "Yes", | ||
13 | "id": "ceeaf408-ffbf-4f01-8c05-8395dd687c3d", | 26 | "id": "ceeaf408-ffbf-4f01-8c05-8395dd687c3d", | ||
14 | "isopen": false, | 27 | "isopen": false, | ||
15 | "license_id": "CC-BY-SA-3.0", | 28 | "license_id": "CC-BY-SA-3.0", | ||
16 | "license_title": "CC-BY-SA-3.0", | 29 | "license_title": "CC-BY-SA-3.0", | ||
17 | "maintainer": "Harjot Kaur", | 30 | "maintainer": "Harjot Kaur", | ||
18 | "maintainer_email": "kaur@sec.uni-hannover.de", | 31 | "maintainer_email": "kaur@sec.uni-hannover.de", | ||
19 | "metadata_created": "2023-01-12T13:13:58.835219", | 32 | "metadata_created": "2023-01-12T13:13:58.835219", | ||
n | 20 | "metadata_modified": "2023-01-12T13:13:58.835224", | n | 33 | "metadata_modified": "2023-08-04T08:46:17.302712", |
21 | "name": "luh-2022-usenix-dev-sampling", | 34 | "name": "luh-2022-usenix-dev-sampling", | ||
22 | "notes": "This is the replication package for the USENIX'22 paper | 35 | "notes": "This is the replication package for the USENIX'22 paper | ||
23 | \u201cWhere to Recruit for Security Development Studies: Comparing Six | 36 | \u201cWhere to Recruit for Security Development Studies: Comparing Six | ||
24 | Software Developer Samples\u201d.\r\n\r\nTo support the | 37 | Software Developer Samples\u201d.\r\n\r\nTo support the | ||
25 | reproducibility of our work, we provide the following materials in | 38 | reproducibility of our work, we provide the following materials in | ||
26 | this replication package:\r\n(a) the screening and final survey | 39 | this replication package:\r\n(a) the screening and final survey | ||
27 | questions we used, (b) the formatted collection of questions we found | 40 | questions we used, (b) the formatted collection of questions we found | ||
28 | in our literature evaluation, (c) text used in the recruitment emails, | 41 | in our literature evaluation, (c) text used in the recruitment emails, | ||
29 | (d) text used in the the job posts, (e) additional figures, (f) | 42 | (d) text used in the the job posts, (e) additional figures, (f) | ||
30 | additional tables, and (g) the consent forms.", | 43 | additional tables, and (g) the consent forms.", | ||
31 | "num_resources": 1, | 44 | "num_resources": 1, | ||
32 | "num_tags": 17, | 45 | "num_tags": 17, | ||
33 | "organization": { | 46 | "organization": { | ||
34 | "approval_status": "approved", | 47 | "approval_status": "approved", | ||
35 | "created": "2021-10-14T10:15:52.219448", | 48 | "created": "2021-10-14T10:15:52.219448", | ||
n | 36 | "description": "https://www.pi.uni-hannover.de/de/sec/", | n | 49 | "description": "https://www.itsec.uni-hannover.de/de/eis/", |
37 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 50 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
38 | "image_url": "", | 51 | "image_url": "", | ||
39 | "is_organization": true, | 52 | "is_organization": true, | ||
n | 40 | "name": "fachgebiet-it-sicherheit", | n | 53 | "name": "fachgebiet-empirical-information-security", |
41 | "state": "active", | 54 | "state": "active", | ||
n | 42 | "title": "Fachgebiet IT-Sicherheit", | n | 55 | "title": "Fachgebiet Empirical Information Security", |
43 | "type": "organization" | 56 | "type": "organization" | ||
44 | }, | 57 | }, | ||
45 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 58 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
46 | "private": false, | 59 | "private": false, | ||
47 | "relationships_as_object": [], | 60 | "relationships_as_object": [], | ||
48 | "relationships_as_subject": [], | 61 | "relationships_as_subject": [], | ||
49 | "repository_name": "Leibniz University Hannover", | 62 | "repository_name": "Leibniz University Hannover", | ||
50 | "resources": [ | 63 | "resources": [ | ||
51 | { | 64 | { | ||
52 | "cache_last_updated": null, | 65 | "cache_last_updated": null, | ||
53 | "cache_url": null, | 66 | "cache_url": null, | ||
54 | "created": "2022-06-14T07:53:28.735317", | 67 | "created": "2022-06-14T07:53:28.735317", | ||
55 | "description": "To support the reproducibility of our work, we | 68 | "description": "To support the reproducibility of our work, we | ||
56 | provide the following materials in this replication package:\r\n(a) | 69 | provide the following materials in this replication package:\r\n(a) | ||
57 | the screening and final survey questions we used, (b) the formatted | 70 | the screening and final survey questions we used, (b) the formatted | ||
58 | collection of questions we found in our literature evaluation, (c) | 71 | collection of questions we found in our literature evaluation, (c) | ||
59 | text used in the recruitment emails, (d) text used in the the job | 72 | text used in the recruitment emails, (d) text used in the the job | ||
60 | posts, (e) additional figures, (f) additional tables, and (g) the | 73 | posts, (e) additional figures, (f) additional tables, and (g) the | ||
61 | consent forms", | 74 | consent forms", | ||
62 | "format": "ZIP", | 75 | "format": "ZIP", | ||
63 | "hash": "", | 76 | "hash": "", | ||
64 | "id": "0c9bc400-c1cb-4674-8971-7c55f71a0526", | 77 | "id": "0c9bc400-c1cb-4674-8971-7c55f71a0526", | ||
65 | "last_modified": "2022-06-14T09:34:22.882652", | 78 | "last_modified": "2022-06-14T09:34:22.882652", | ||
n | 66 | "metadata_modified": "2023-01-12T13:13:58.814417", | n | 79 | "metadata_modified": "2023-08-04T08:46:17.305790", |
67 | "mimetype": "application/zip", | 80 | "mimetype": "application/zip", | ||
68 | "mimetype_inner": null, | 81 | "mimetype_inner": null, | ||
69 | "name": "replication-package.zip", | 82 | "name": "replication-package.zip", | ||
70 | "package_id": "ceeaf408-ffbf-4f01-8c05-8395dd687c3d", | 83 | "package_id": "ceeaf408-ffbf-4f01-8c05-8395dd687c3d", | ||
71 | "position": 0, | 84 | "position": 0, | ||
72 | "resource_type": null, | 85 | "resource_type": null, | ||
73 | "size": 500013, | 86 | "size": 500013, | ||
74 | "state": "active", | 87 | "state": "active", | ||
75 | "url": | 88 | "url": | ||
76 | c9bc400-c1cb-4674-8971-7c55f71a0526/download/replication-package.zip", | 89 | c9bc400-c1cb-4674-8971-7c55f71a0526/download/replication-package.zip", | ||
77 | "url_type": "" | 90 | "url_type": "" | ||
78 | } | 91 | } | ||
79 | ], | 92 | ], | ||
t | t | 93 | "services_used_list": "", | ||
80 | "source_metadata_created": "2022-06-14T07:45:34.339425", | 94 | "source_metadata_created": "2022-06-14T07:45:34.339425", | ||
81 | "source_metadata_modified": "2022-06-14T09:34:22.897579", | 95 | "source_metadata_modified": "2022-06-14T09:34:22.897579", | ||
82 | "state": "active", | 96 | "state": "active", | ||
83 | "tags": [ | 97 | "tags": [ | ||
84 | { | 98 | { | ||
85 | "display_name": "computer security", | 99 | "display_name": "computer security", | ||
86 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 100 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
87 | "name": "computer security", | 101 | "name": "computer security", | ||
88 | "state": "active", | 102 | "state": "active", | ||
89 | "vocabulary_id": null | 103 | "vocabulary_id": null | ||
90 | }, | 104 | }, | ||
91 | { | 105 | { | ||
92 | "display_name": "cs students", | 106 | "display_name": "cs students", | ||
93 | "id": "7b27b1ad-4bc7-4368-ad45-47f749cb0892", | 107 | "id": "7b27b1ad-4bc7-4368-ad45-47f749cb0892", | ||
94 | "name": "cs students", | 108 | "name": "cs students", | ||
95 | "state": "active", | 109 | "state": "active", | ||
96 | "vocabulary_id": null | 110 | "vocabulary_id": null | ||
97 | }, | 111 | }, | ||
98 | { | 112 | { | ||
99 | "display_name": "developers", | 113 | "display_name": "developers", | ||
100 | "id": "755f1936-3ba6-49fa-8242-e6a49a5f577d", | 114 | "id": "755f1936-3ba6-49fa-8242-e6a49a5f577d", | ||
101 | "name": "developers", | 115 | "name": "developers", | ||
102 | "state": "active", | 116 | "state": "active", | ||
103 | "vocabulary_id": null | 117 | "vocabulary_id": null | ||
104 | }, | 118 | }, | ||
105 | { | 119 | { | ||
106 | "display_name": "freelancer", | 120 | "display_name": "freelancer", | ||
107 | "id": "cd1a13af-5df8-4973-b0e8-2995ac93ee28", | 121 | "id": "cd1a13af-5df8-4973-b0e8-2995ac93ee28", | ||
108 | "name": "freelancer", | 122 | "name": "freelancer", | ||
109 | "state": "active", | 123 | "state": "active", | ||
110 | "vocabulary_id": null | 124 | "vocabulary_id": null | ||
111 | }, | 125 | }, | ||
112 | { | 126 | { | ||
113 | "display_name": "google play", | 127 | "display_name": "google play", | ||
114 | "id": "1967578f-b845-4979-ace7-45b9f4466257", | 128 | "id": "1967578f-b845-4979-ace7-45b9f4466257", | ||
115 | "name": "google play", | 129 | "name": "google play", | ||
116 | "state": "active", | 130 | "state": "active", | ||
117 | "vocabulary_id": null | 131 | "vocabulary_id": null | ||
118 | }, | 132 | }, | ||
119 | { | 133 | { | ||
120 | "display_name": "mturk", | 134 | "display_name": "mturk", | ||
121 | "id": "6847e745-a66b-4487-b5e4-47d52e3383f3", | 135 | "id": "6847e745-a66b-4487-b5e4-47d52e3383f3", | ||
122 | "name": "mturk", | 136 | "name": "mturk", | ||
123 | "state": "active", | 137 | "state": "active", | ||
124 | "vocabulary_id": null | 138 | "vocabulary_id": null | ||
125 | }, | 139 | }, | ||
126 | { | 140 | { | ||
127 | "display_name": "privacy", | 141 | "display_name": "privacy", | ||
128 | "id": "af080db8-7f8f-49a0-a429-dc93037ce39e", | 142 | "id": "af080db8-7f8f-49a0-a429-dc93037ce39e", | ||
129 | "name": "privacy", | 143 | "name": "privacy", | ||
130 | "state": "active", | 144 | "state": "active", | ||
131 | "vocabulary_id": null | 145 | "vocabulary_id": null | ||
132 | }, | 146 | }, | ||
133 | { | 147 | { | ||
134 | "display_name": "prolific", | 148 | "display_name": "prolific", | ||
135 | "id": "ffd42c39-0ca8-427f-a25b-d81aaf26f634", | 149 | "id": "ffd42c39-0ca8-427f-a25b-d81aaf26f634", | ||
136 | "name": "prolific", | 150 | "name": "prolific", | ||
137 | "state": "active", | 151 | "state": "active", | ||
138 | "vocabulary_id": null | 152 | "vocabulary_id": null | ||
139 | }, | 153 | }, | ||
140 | { | 154 | { | ||
141 | "display_name": "replication package", | 155 | "display_name": "replication package", | ||
142 | "id": "4116c775-a5c5-4a93-b456-97e3c8c8a72f", | 156 | "id": "4116c775-a5c5-4a93-b456-97e3c8c8a72f", | ||
143 | "name": "replication package", | 157 | "name": "replication package", | ||
144 | "state": "active", | 158 | "state": "active", | ||
145 | "vocabulary_id": null | 159 | "vocabulary_id": null | ||
146 | }, | 160 | }, | ||
147 | { | 161 | { | ||
148 | "display_name": "research", | 162 | "display_name": "research", | ||
149 | "id": "d3ece6e0-09db-4da2-9def-f04ea7529d09", | 163 | "id": "d3ece6e0-09db-4da2-9def-f04ea7529d09", | ||
150 | "name": "research", | 164 | "name": "research", | ||
151 | "state": "active", | 165 | "state": "active", | ||
152 | "vocabulary_id": null | 166 | "vocabulary_id": null | ||
153 | }, | 167 | }, | ||
154 | { | 168 | { | ||
155 | "display_name": "sample", | 169 | "display_name": "sample", | ||
156 | "id": "443e56b1-346f-46de-a3aa-d2ca46e16207", | 170 | "id": "443e56b1-346f-46de-a3aa-d2ca46e16207", | ||
157 | "name": "sample", | 171 | "name": "sample", | ||
158 | "state": "active", | 172 | "state": "active", | ||
159 | "vocabulary_id": null | 173 | "vocabulary_id": null | ||
160 | }, | 174 | }, | ||
161 | { | 175 | { | ||
162 | "display_name": "study", | 176 | "display_name": "study", | ||
163 | "id": "2198f306-217b-4749-b191-f2db98ec6ec8", | 177 | "id": "2198f306-217b-4749-b191-f2db98ec6ec8", | ||
164 | "name": "study", | 178 | "name": "study", | ||
165 | "state": "active", | 179 | "state": "active", | ||
166 | "vocabulary_id": null | 180 | "vocabulary_id": null | ||
167 | }, | 181 | }, | ||
168 | { | 182 | { | ||
169 | "display_name": "study material", | 183 | "display_name": "study material", | ||
170 | "id": "83c4ffd4-ee16-4757-a2dc-54f24f2b7302", | 184 | "id": "83c4ffd4-ee16-4757-a2dc-54f24f2b7302", | ||
171 | "name": "study material", | 185 | "name": "study material", | ||
172 | "state": "active", | 186 | "state": "active", | ||
173 | "vocabulary_id": null | 187 | "vocabulary_id": null | ||
174 | }, | 188 | }, | ||
175 | { | 189 | { | ||
176 | "display_name": "survey", | 190 | "display_name": "survey", | ||
177 | "id": "eb461667-e23f-4034-8bdf-182220ea042f", | 191 | "id": "eb461667-e23f-4034-8bdf-182220ea042f", | ||
178 | "name": "survey", | 192 | "name": "survey", | ||
179 | "state": "active", | 193 | "state": "active", | ||
180 | "vocabulary_id": null | 194 | "vocabulary_id": null | ||
181 | }, | 195 | }, | ||
182 | { | 196 | { | ||
183 | "display_name": "upwork", | 197 | "display_name": "upwork", | ||
184 | "id": "297afb22-e638-4e3c-8bd3-0eabd19f87bc", | 198 | "id": "297afb22-e638-4e3c-8bd3-0eabd19f87bc", | ||
185 | "name": "upwork", | 199 | "name": "upwork", | ||
186 | "state": "active", | 200 | "state": "active", | ||
187 | "vocabulary_id": null | 201 | "vocabulary_id": null | ||
188 | }, | 202 | }, | ||
189 | { | 203 | { | ||
190 | "display_name": "usability", | 204 | "display_name": "usability", | ||
191 | "id": "22529039-1abc-4d0f-9553-161e8a14e3ed", | 205 | "id": "22529039-1abc-4d0f-9553-161e8a14e3ed", | ||
192 | "name": "usability", | 206 | "name": "usability", | ||
193 | "state": "active", | 207 | "state": "active", | ||
194 | "vocabulary_id": null | 208 | "vocabulary_id": null | ||
195 | }, | 209 | }, | ||
196 | { | 210 | { | ||
197 | "display_name": "usable security", | 211 | "display_name": "usable security", | ||
198 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | 212 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | ||
199 | "name": "usable security", | 213 | "name": "usable security", | ||
200 | "state": "active", | 214 | "state": "active", | ||
201 | "vocabulary_id": null | 215 | "vocabulary_id": null | ||
202 | } | 216 | } | ||
203 | ], | 217 | ], | ||
204 | "terms_of_usage": "Yes", | 218 | "terms_of_usage": "Yes", | ||
205 | "title": "Replication Package: \"Where to Recruit for Security | 219 | "title": "Replication Package: \"Where to Recruit for Security | ||
206 | Development Studies: Comparing Six Software Developer Samples\"", | 220 | Development Studies: Comparing Six Software Developer Samples\"", | ||
207 | "type": "vdataset", | 221 | "type": "vdataset", | ||
208 | "url": | 222 | "url": | ||
209 | "https://data.uni-hannover.de/dataset/2022-usenix-dev-sampling", | 223 | "https://data.uni-hannover.de/dataset/2022-usenix-dev-sampling", | ||
210 | "version": "1.0" | 224 | "version": "1.0" | ||
211 | } | 225 | } |