Shari Lawrence Pfleeger

According to our database1, Shari Lawrence Pfleeger authored at least 113 papers between 1988 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Foreword - A Social Science Perspective of Trust and Cyber Security.
Ingénierie des Systèmes d Inf., 2017

2016
Software Everywhere.
IEEE Secur. Priv., 2016

Barriers to Usable Security? Three Organizational Case Studies.
IEEE Secur. Priv., 2016

2015
Lessons Learned by Our Editorial Board.
IEEE Secur. Priv., 2015

Spider-Man, Hubris, and the Future of Security and Privacy.
IEEE Secur. Priv., 2015

Learning from Other Disciplines.
IEEE Secur. Priv., 2015

2014
Technology, Transparency, and Trust.
IEEE Secur. Priv., 2014

Expanding to Meet Readers' Needs.
IEEE Secur. Priv., 2014

The Eyes Have It: Surveillance and How It Evolved.
IEEE Secur. Priv., 2014

Going Spear Phishing: Exploring Embedded Training and Awareness.
IEEE Secur. Priv., 2014

2013
Focus on Policy.
IEEE Secur. Priv., 2013

Ramsey Theory: Learning about the Needle in the Haystack.
IEEE Secur. Priv., 2013

Enlightened Security: Shedding Light on What Works and Why.
IEEE Secur. Priv., 2013

2012
Does Profiling Make Us More Secure?
IEEE Secur. Priv., 2012

Guest Editors' Introduction.
IEEE Secur. Priv., 2012

Security Measurement Steps, Missteps, and Next Steps.
IEEE Secur. Priv., 2012

A Key to the Castle.
IEEE Secur. Priv., 2012

Leveraging behavioral science to mitigate cyber security risk.
Comput. Secur., 2012

Security in Computing, 4th Edition.
Prentice Hall, ISBN: 978-0-13-239077-4, 2012

Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach.
Prentice Hall, ISBN: 978-0-13-283940-2, 2012

2011
Guest Editors' Introduction: Software as a Business.
IEEE Softw., 2011

Guest Editors' Introduction: Shouldn't All Security Be Usable?
IEEE Secur. Priv., 2011

Addressing Information Risk in Turbulent Times.
IEEE Secur. Priv., 2011

2010
Insiders behaving badly: addressing bad actors and their actions.
IEEE Trans. Inf. Forensics Secur., 2010

Anatomy of an Intrusion.
IT Prof., 2010

Why Measuring Security Is Hard.
IEEE Secur. Priv., 2010

Security Decision Support Challenges in Data Collection and Use.
IEEE Secur. Priv., 2010

2009
Useful Cybersecurity Metrics.
IT Prof., 2009

Making the Best Use of Cybersecurity Economic Models.
IEEE Secur. Priv., 2009

Addressing the Insider Threat.
IEEE Secur. Priv., 2009

Searching for You.
IEEE Secur. Priv., 2009

Security through Information Risk Management.
IEEE Secur. Priv., 2009

Harmonizing privacy with security principles and practices.
IBM J. Res. Dev., 2009

Software engineering - theory and practice (4. ed.).
Pearson Education, ISBN: 978-0-13-814181-3, 2009

2008
Cybersecurity Economic Issues: Clearing the Path to Good Practice.
IEEE Softw., 2008

Software Metrics: Progress after 25 Years?
IEEE Softw., 2008

Choosing a Security Option: The InfoSecure Methodology.
IT Prof., 2008

Insiders Behaving Badly.
IEEE Secur. Priv., 2008

Personal Opinion Surveys.
Proceedings of the Guide to Advanced Empirical Software Engineering, 2008

2007
Guest Editors' Introduction: Managing Organizational Security.
IEEE Secur. Priv., 2007

I'll Buy That! Cybersecurity in the Internet Marketplace.
IEEE Secur. Priv., 2007

Spooky Lessons.
IEEE Secur. Priv., 2007

Software Engineering Decision Support.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Measuring up: how to keep security metrics useful and realistic.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Why We Won't Review Books by Hackers.
IEEE Secur. Priv., 2006

Everything You Wanted to Know about Privacy (But Were Afraid to Ask).
IEEE Secur. Priv., 2006

Software engineering - theory and practice (3. ed.).
Ellis Horwood, ISBN: 978-0-13-198461-5, 2006

2005
Soup or Art? The Role of Evidential Force in Empirical Software Engineering.
IEEE Softw., 2005

Analyzing the Evolution of Large-Scale Software.
J. Softw. Maintenance Res. Pract., 2005

Erratum to "An empirical study of maintenance and development estimation accuracy" [The Journal of Systems and Software 64 (2002) 57-77].
J. Syst. Softw., 2005

Canning Spam: Proposed Solutions to Unwanted Email.
IEEE Secur. Priv., 2005

2004
New Year's Resolutions for Software Quality.
IEEE Softw., 2004

Book Reviews.
IEEE Secur. Priv., 2004

Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Principles of survey research part 6: data analysis.
ACM SIGSOFT Softw. Eng. Notes, 2003

Keynote: May The Force Be With You: The Role of Evidential Force in Empirical Software Engineering.
Proceedings of the 9th IEEE International Software Metrics Symposium (METRICS 2003), 2003

2002
Preliminary Guidelines for Empirical Research in Software Engineering.
IEEE Trans. Software Eng., 2002

What Software Engineering Can Learn from Soccer.
IEEE Softw., 2002

Principles of survey research: part 5: populations and samples.
ACM SIGSOFT Softw. Eng. Notes, 2002

Principles of survey research part 4: questionnaire evaluation.
ACM SIGSOFT Softw. Eng. Notes, 2002

Principles of survey research: part 3: constructing a survey instrument.
ACM SIGSOFT Softw. Eng. Notes, 2002

Principles of survey research part 2: designing a survey.
ACM SIGSOFT Softw. Eng. Notes, 2002

An empirical study of maintenance and development estimation accuracy.
J. Syst. Softw., 2002

Solid Software: Is It Rocket Science?
Proceedings of the Software Quality, 2002

2001
Principles of survey research: part 1: turning lemons into lemonade.
ACM SIGSOFT Softw. Eng. Notes, 2001

Increasing the enrollment of women in computer science.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001

Decision-Making in Software Engineering.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001

What Good Are Metrics? The Views of Industry and Academia.
Proceedings of the 7th IEEE International Software Metrics Symposium (METRICS 2001), 2001

2000
Marketing Technology to Software Practitioners.
IEEE Softw., 2000

Risky business: what we have yet to learn about risk management.
J. Syst. Softw., 2000

Decisions and Delphi: The Dynamics of Group Estimation.
Proceedings of the 14th Brazilian Symposium on Software Engineering, 2000

1999
Understanding and improving technology transfer in software engineering.
J. Syst. Softw., 1999

Albert Einstein and Empirical Software Engineering.
Computer, 1999

1998
The Nature of System Change.
IEEE Softw., 1998

Making software development investment decisions.
ACM SIGSOFT Softw. Eng. Notes, 1998

Empirical Studies of Software Maintenance: A Report from WESS '97.
Empir. Softw. Eng., 1998

Making Change: The Other Components of Software Maintenance.
Proceedings of the 1998 International Conference on Software Maintenance, 1998

1997
Reply to: Comments on "Toward a Framework for Software Measurement Validation".
IEEE Trans. Software Eng., 1997

Status Report on Software Measurement.
IEEE Softw., 1997

Quality Time: Guidelines for Applying Research Results.
IEEE Softw., 1997

Guest Editor's Introduction: Assessing Measurement.
IEEE Softw., 1997

Evaluation and assessment in software engineering.
Inf. Softw. Technol., 1997

Investigating the Influence of Formal Methods.
Computer, 1997

Desert Island Column.
Autom. Softw. Eng., 1997

Experimentation in Software Engineering.
Adv. Comput., 1997

Evaluating Software Technology (Tutorial).
Proceedings of the Pulling Together, 1997

1996
Measuring Reuse: A Cautionary Tale.
IEEE Softw., 1996

Software Quality: The Elusive Target.
IEEE Softw., 1996

In the News.
IEEE Softw., 1996

Wavefront: a goal-driven requirements process model.
Inf. Softw. Technol., 1996

Software metrics - a practical and rigorous approach (2. ed.).
International Thomson, ISBN: 978-1-85032-275-7, 1996

1995
Towards a Framework for Software Measurement Validation.
IEEE Trans. Software Eng., 1995

Questionable Approaches To Process Improvement.
IEEE Softw., 1995

Case Studies for Method and Tool Evaluation.
IEEE Softw., 1995

Making Reuse Work At Hewlett-Packard.
IEEE Softw., 1995

Experimental design and analysis in software engineering, part 5: analyzing the data.
ACM SIGSOFT Softw. Eng. Notes, 1995

Experimental design and analysis in software engineering, part 4: choosing an experimental design.
ACM SIGSOFT Softw. Eng. Notes, 1995

Experimental Design and Analysis in Software Engineering: Types of Experimental Design.
ACM SIGSOFT Softw. Eng. Notes, 1995

Experimental design and analysis in software engineering: Part 2: how to set up and experiment.
ACM SIGSOFT Softw. Eng. Notes, 1995

Maturity, models, and goals: How to build a metrics plan.
J. Syst. Softw., 1995

Executive Mentoring - What Makes It Work?
Commun. ACM, 1995

Experimental Design and Analysis in Software Engineering.
Ann. Softw. Eng., 1995

1994
Measurement Based Process Improvement.
IEEE Softw., 1994

Science and Substance: A Challenge to Software Engineers.
IEEE Softw., 1994

Design and analysis in software engineering: the language of case studies and formal experiments.
ACM SIGSOFT Softw. Eng. Notes, 1994

The economics of reuse: new approaches to modelling and assessing cost.
Inf. Softw. Technol., 1994

Evaluating Software Engineering Standards.
Computer, 1994

1993
Lessons Learned in Building a Corporate Metrics Program.
IEEE Softw., 1993

1991
A framework for security requirements.
Comput. Secur., 1991

1990
Software metrics in the process maturity framework.
J. Syst. Softw., 1990

A framework for software maintenance metrics.
Proceedings of the Conference on Software Maintenance, 1990

1989
A methodology for penetration testing.
Comput. Secur., 1989

1988
A transaction flow approach to software security certification for document handling systems.
Comput. Secur., 1988


  Loading...