{"_id":"2ariFDzraPKA2rDeD","bibbaseid":"jordan-johnson-witschey-murphyhill-designinginterventionstopersuadesoftwaredeveloperstoadoptsecuritytools-2014","downloads":1,"creationDate":"2017-02-09T04:44:05.982Z","title":"Designing Interventions to Persuade Software Developers to Adopt Security Tools","author_short":["Jordan, B.","Johnson, B.","Witschey, J.","Murphy-Hill, E."],"year":2014,"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/DeveloperLiberationFront/bibtex-library/master/our-papers.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Jordan"],"firstnames":["Brooke"],"suffixes":[]},{"propositions":[],"lastnames":["Johnson"],"firstnames":["Brittany"],"suffixes":[]},{"propositions":[],"lastnames":["Witschey"],"firstnames":["Jim"],"suffixes":[]},{"propositions":[],"lastnames":["Murphy-Hill"],"firstnames":["Emerson"],"suffixes":[]}],"booktitle":"Proceedings of the CCS Workshop on Security Information Workers","citeulike-article-id":"13366838","citeulike-linkout-0":"http://dx.doi.org/10.1145/2663887.2663900","doi":"10.1145/2663887.2663900","howpublished":"4. Workshop","keywords":"adoption, security, tool_adoption","posted-at":"2014-09-18 14:39:30","priority":"2","title":"Designing Interventions to Persuade Software Developers to Adopt Security Tools","url":"http://dx.doi.org/10.1145/2663887.2663900","year":"2014","bibtex":"@inproceedings{Jordan2014Designing,\n author = {Jordan, Brooke and Johnson, Brittany and Witschey, Jim and Murphy-Hill, Emerson},\n booktitle = {Proceedings of the CCS Workshop on Security Information Workers},\n citeulike-article-id = {13366838},\n citeulike-linkout-0 = {http://dx.doi.org/10.1145/2663887.2663900},\n doi = {10.1145/2663887.2663900},\n howpublished = {4. Workshop},\n keywords = {adoption, security, tool\\_adoption},\n posted-at = {2014-09-18 14:39:30},\n priority = {2},\n title = {{Designing Interventions to Persuade Software Developers to Adopt\nSecurity Tools}},\n url = {http://dx.doi.org/10.1145/2663887.2663900},\n year = {2014}\n}\n\n","author_short":["Jordan, B.","Johnson, B.","Witschey, J.","Murphy-Hill, E."],"key":"Jordan2014Designing","id":"Jordan2014Designing","bibbaseid":"jordan-johnson-witschey-murphyhill-designinginterventionstopersuadesoftwaredeveloperstoadoptsecuritytools-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1145/2663887.2663900"},"keyword":["adoption","security","tool_adoption"],"metadata":{"authorlinks":{"murphy-hill, e":"https://people.engr.ncsu.edu/"}},"downloads":1,"html":""},"search_terms":["designing","interventions","persuade","software","developers","adopt","security","tools","jordan","johnson","witschey","murphy-hill"],"keywords":["adoption","security","tool_adoption"],"authorIDs":["ufMJtsYPDLDPZbTYS"],"dataSources":["nHDichzRuRdGMsJQG","cfNfJKkdJZ7LeZWkg"]}