Search For:

Displaying 1-50 out of 59 total
Does Profiling Make Us More Secure?
Found in: IEEE Security & Privacy Magazine
By Shari Lawrence Pfleeger,Marc Rogers,Masooda Bashir,Kelly Caine,Deanna Caputo,Michael Losavio,Sal Stolfo
Issue Date:July 2012
pp. 10-15
“Profiling” means making predictions about likely user behavior based on collected characteristics and activities. Shari Lawrence Pfleeger and Marc Rogers brought together a group of researchers from a variety of disciplines to discus...
 
Everything You Wanted to Know about Privacy (But Were Afraid to Ask)
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger
Issue Date:May 2006
pp. 5
A review of the book,
 
Making Reuse Work At Hewlett-Packard
Found in: IEEE Software
By Martin L. Griss, Marty Wosser, Shari Lawrence Pfleeger
Issue Date:January 1995
pp. 105-107
<p>For the last seven years, Martin Griss and his colleagues have investigated how Hewlett-Packard can improve its software-development process using systematic software reuse. Griss has been a professor, research laboratory manager, and industrial r...
 
Software Metrics: Progress after 25 Years?
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:November 2008
pp. 32-34
This article traces the increasing sophistication and use of software measurement over the past 25 years. It highlights four obstacles to more effective use of measurement: dealing with uncertainty, anticipating change, measuring
 
Searching for You
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger
Issue Date:March 2009
pp. 15
No summary available.
 
Spooky Lessons
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger
Issue Date:September 2007
pp. 7
Book reviews on the latest in security and privacy.
 
Book Reviews
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger
Issue Date:May 2004
pp. 7
Book review of
 
Marketing Technology to Software Practitioners
Found in: IEEE Software
By Shari Lawrence Pfleeger, Winifred Menezes
Issue Date:January 2000
pp. 27-33
We can learn much from the business community about effective technology transfer. In particular, understanding the interests of different types of adopters can suggest to us the different kinds of evidence needed to convince someone to try an innovative t...
 
The Nature of System Change
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:May 1998
pp. 87-90
No summary available.
 
Making Change: The Other Components of Software Maintenance
Found in: Software Maintenance, IEEE International Conference on
By Shari Lawrence Pfleeger
Issue Date:March 1998
pp. 2
No summary available.
 
Guidelines for Applying Research Results
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:May 1997
pp. 102-104
<p>New views of mature ideas on software quality and productivity.</p>
 
Investigating the Influence of Formal Methods
Found in: Computer
By Shari Lawrence Pfleeger, Les Hatton
Issue Date:February 1997
pp. 33-43
<p>Formal methods promise much, but can they deliver? In this project, results are inconclusive, but careful data gathering and analysis helped establish influences on product quality. </p> <p>Practitioners and researchers continue to see...
 
Case Studies for Method and Tool Evaluation
Found in: IEEE Software
By Barbara Kitchenham, Lesley Pickard, Shari Lawrence Pfleeger
Issue Date:July 1995
pp. 52-62
The last decade has seen explosive growth in the number of software-engineering methods and tools, each one offering to improve some characteristic of software, its development, or its maintenance. With an increasing awareness of the competitive advantage ...
 
Measurement Based Process Improvement
Found in: IEEE Software
By Shari Lawrence Pfleeger, Hans Dieter Rombach
Issue Date:July 1994
pp. 8-11
<p>Used together, the two relatively young concepts of measurement and process improvement are more than the sum of their parts. Careful measurement helps you draw an objective process model. Thoughtful application of improvement techniques improves ...
 
Why Measuring Security Is Hard
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger, Robert Cunningham
Issue Date:July 2010
pp. 46-54
For many years, we've been trying to measure
 
Evaluating software engineering standards
Found in: Computer
By Shari Lawrence Pfleeger, Norman Fenton, Stella Page
Issue Date:September 1994
pp. 71-79
<p>The authors report on the results of the Smartie project (Standards and Methods Assessment Using Rigorous Techniques in Industrial Environments), a collaborative effort to propose a widely applicable procedure for the objective assessment of stand...
 
Science and Substance: A Challenge to Software Engineers
Found in: IEEE Software
By Norman Fenton, Shari Lawrence Pfleeger, Robert L. Glass
Issue Date:July 1994
pp. 86-95
<p>For 25 years, software researchers have proposed improving software development and maintenance with new practices whose effectiveness is rarely, if ever, backed up by hard evidence. We suggest several ways to address the problem, and we challenge...
 
Security through Information Risk Management
Found in: IEEE Security and Privacy
By M. Eric Johnson, Eric Goetz, Shari Lawrence Pfleeger
Issue Date:May 2009
pp. 45-52
Although security professionals have long talked about risk, moving an organization from a
 
Choosing a Security Option: The InfoSecure Methodology
Found in: IT Professional
By Shari Lawrence Pfleeger, Thomas Ciszek
Issue Date:September 2008
pp. 46-52
This article presents a four-step process for evaluating assets to be protected, potential assailants, and likely methods and tactics. It puts the results together as a plan of action for investing in cybersecurity in ways that protect the most critical or...
 
Guest Editors' Introduction: Managing Organizational Security
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger, Roland L. Trope, Charles C. Palmer
Issue Date:May 2007
pp. 13-15
In this special issue, we focus on the challenges of managing organizational security, examining some of the nontechnical aspects of security that assure that the technology is chosen, implemented, and used appropriately and well.
 
Software Quality: The Elusive Target
Found in: IEEE Software
By Barbara Kitchenham, Shari Lawrence Pfleeger
Issue Date:January 1996
pp. 12-21
<p>If you are a software developer, manager, or maintainer, quality is often on your mind. But what do you really mean by software quality? Is your definition adequate? Is the software you produce better or worse than you would like it to be? In this...
 
Expanding to Meet Readers' Needs
Found in: IEEE Security & Privacy
By Shari Lawrence Pfleeger
Issue Date:September 2014
pp. 3-4
This editorial describes how IEEE Security &amp; Privacy has expanded its offerings to more effectively meet readers' needs.
   
Going Spear Phishing: Exploring Embedded Training and Awareness
Found in: IEEE Security & Privacy
By Deanna D. Caputo,Shari Lawrence Pfleeger,Jesse D. Freeman,M. Eric Johnson
Issue Date:January 2014
pp. 28-38
To explore the effectiveness of embedded training, researchers conducted a large-scale experiment that tracked workers' reactions to a series of carefully crafted spear phishing emails and a variety of immediate training and awareness activities. Based on ...
 
Focus on Policy
Found in: IEEE Security & Privacy
By Shari Lawrence Pfleeger
Issue Date:November 2013
pp. 3
Edward Snowden's revelations are bringing discussions about technology back into a healthier balance with discussions of related policy and research, and they've initiated a robust and too-long-absent debate about the roles of technology and policy in a he...
 
Ramsey theory: Learning about the needle in the haystack
Found in: IEEE Security & Privacy
By Shari Lawrence Pfleeger
Issue Date:May 2013
pp. 85-87
Results from number theory show us that even in seemingly random sets, we can find order; total disorder is impossible. Ramsey's theorem can help broaden our perspective in cybersecurity by showing us how to use the emergent order to find patterns and to d...
 
Enlightened Security: Shedding Light on What Works and Why
Found in: IEEE Security & Privacy
By Shari Lawrence Pfleeger
Issue Date:January 2013
pp. 3-4
As we mature and move toward "enlightened security," this magazine will explore why we do what we do and what we know about cause and effect. We will also broaden content to address dependability and policy, and to apply contributions that other ...
 
Security Measurement Steps, Missteps, and Next Steps
Found in: IEEE Security & Privacy Magazine
By Shari Lawrence Pfleeger
Issue Date:July 2012
pp. 5-9
Over the past decade, this magazine has focused on a wide variety of important issues, each of which contributes not only to our understanding of security but also to innovative and effective solutions to security problems. Measurement has frequently held ...
 
A Key to the Castle
Found in: IEEE Security & Privacy
By Shari Lawrence Pfleeger
Issue Date:May 2012
pp. 3
Understanding and providing incentives for good security behavior can be more effective and welcome than disruptive or constraining technology.
 
Guest Editors' Introduction
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger,Cynthia Irvine,Mischel Kwon
Issue Date:March 2012
pp. 19-23
From confusing online terms of use to changing forms of data collection, users must make difficult decisions about protecting their work and themselves online. The average citizen is repeatedly asked to make decisions at home and on the job for which answe...
 
Guest Editors' Introduction: Software as a Business
Found in: IEEE Software
By John Favaro,Shari Lawrence Pfleeger
Issue Date:July 2011
pp. 22-25
Software plays an increasingly important role in most aspects of business. Many new business models for software-intensive enterprises have arisen in the last decade, ranging from selling software as a service to offshoring and crowdsourcing. Governments a...
 
Guest Editors' Introduction: Shouldn't All Security Be Usable?
Found in: IEEE Security and Privacy
By Mary Frances Theofanos, Shari Lawrence Pfleeger
Issue Date:March 2011
pp. 12-17
This introduction to the IEEE Security & Privacy special issue on usability and security provides a description of how usable security has been transformed from a desirable system property to a rich area of serious research. It explains how usability t...
 
Addressing the Insider Threat
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger, Salvatore J. Stolfo
Issue Date:November 2009
pp. 10-13
In their guest editors' introduction to the special issue on Insider Threat, Shari Lawrence Pfleeger and Salvatore Stolfo describe a taxonomy of insiders and their unwelcome actions, as well as the need for credible data to document the size and nature of ...
 
Making the Best Use of Cybersecurity Economic Models
Found in: IEEE Security and Privacy
By Rachel Rue, Shari Lawrence Pfleeger
Issue Date:July 2009
pp. 52-60
This article describes an analysis of several representative cybersecurity economic models, where the authors seek to determine whether each model's underlying assumptions are realistic and useful. They find that many of the assumptions are the same across...
 
Useful Cybersecurity Metrics
Found in: IT Professional
By Shari Lawrence Pfleeger
Issue Date:May 2009
pp. 38-45
Measuring cybersecurity is difficult, but other disciplines can offer important lessons and techniques for building a system that can help test hypotheses about system security.
 
Insiders Behaving Badly
Found in: IEEE Security and Privacy
By Joel Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford
Issue Date:July 2008
pp. 66-70
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors ...
 
Cybersecurity Economic Issues: Clearing the Path to Good Practice
Found in: IEEE Software
By Shari Lawrence Pfleeger, Rachel Rue
Issue Date:January 2008
pp. 35-42
Software project managers have limited project resources. Requests for security improvements must compete with other requests, such as for new tools, more staff, and additional testing. Deciding how and whether to invest in cybersecurity protection require...
 
I'll Buy That! Cybersecurity in the Internet Marketplace
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger, Martin Libicki, Michael Webber
Issue Date:May 2007
pp. 25-31
Interviews with chief security officers in the Internet supply chain (those companies that provide Internet services or encourage people to use the Internet) reveal dramatically different attitudes about corporate cybersecurity. The authors' preliminary in...
 
Software Engineering Decision Support
Found in: Hawaii International Conference on System Sciences
By Guenther Ruhe, Shari Lawrence Pfleeger
Issue Date:January 2007
pp. 282
Developing software involves making hundreds, even thousands, of decisions. Decisions in the context of software systems are hard to make, as the information available is incomplete, uncertain and dynamically changing. Even worse, these decisions are often...
   
Canning Spam: Proposed Solutions to Unwanted Email
Found in: IEEE Security and Privacy
By Shari Lawrence Pfleeger, Gabrielle Bloom
Issue Date:March 2005
pp. 40-47
Unsolicited email is a major problem for anyone who transmits or receives email on a computer, telephone, or personal digital assistant. This article describes the magnitude of the problem, the reasons for proliferation, some interventions available today,...
 
Soup or Art? The Role of Evidential Force in Empirical Software Engineering
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:January 2005
pp. 66-73
Software project managers make decisions about many things, including resources, tools and techniques, often aiming to identify good or best practices. But these decisions should be based on solid evidence, not on common wisdom or vendor hype. The author e...
 
New Year's Resolutions for Software Quality
Found in: IEEE Software
By Victor R. Basili, Barry Boehm, Al Davis, Watts S. Humphrey, Nancy Leveson, Nancy R. Mead, John D. Musa, David Lorge Parnas, Shari Lawrence Pfleeger, Elaine Weyuker
Issue Date:January 2004
pp. 12-13
<p>In the spirit of making resolutions for betterment in the New Year, ten distinguished individuals in the software quality field offer their recommendations on how organizations can improve software quality.</p>
 
Keynote: May The Force Be With You: The Role of Evidential Force in Empirical Software Engineering
Found in: Software Metrics, IEEE International Symposium on
By Shari Lawrence Pfleeger
Issue Date:September 2003
pp. xiii
No summary available.
   
What Software Engineering Can Learn from Soccer
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:November 2002
pp. 64-65
No summary available.
 
Preliminary Guidelines for Empirical Research in Software Engineering
Found in: IEEE Transactions on Software Engineering
By Barbara A. Kitchenham, Shari Lawrence Pfleeger, Lesley M. Pickard, Peter W. Jones, David C. Hoaglin, Khaled El Emam, Jarrett Rosenberg
Issue Date:August 2002
pp. 721-734
<p><b>Abstract</b>—Empirical software engineering research needs research guidelines to improve the research and reporting processes. We propose a preliminary set of research guidelines aimed at stimulating discussion among software resea...
 
Albert Einstein and Empirical Software Engineering
Found in: Computer
By Shari Lawrence Pfleeger
Issue Date:October 1999
pp. 32-38
<p>The author believes that scientists apply scientific investigative techniques to gain more understanding of what makes software
 
Bookshelf
Found in: IEEE Software
By Boris Beizer, Natalia Juristo, Shari Lawrence Pfleeger
Issue Date:July 1997
pp. 114-118
<p>Spanning software's diverse theories, practices, and philosophies.</p>
 
Reply to: Comments on
Found in: IEEE Transactions on Software Engineering
By Barbara Kitchenham, Shari Lawrence Pfleeger, Norman Fenton
Issue Date:March 1997
pp. 189
No summary available.
 
Assessing Measurement
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:March 1997
pp. 25-26
No summary available.
 
Status Report on Software Measurement
Found in: IEEE Software
By Shari Lawrence Pfleeger, Ross Jeffery, Bill Curtis, Barbara Kitchenham
Issue Date:March 1997
pp. 33-43
The most successful measurement programs are ones in which researchers, practitioner, and customer work hand in hand to meet goals and solve problems. But such collaboration is rare. The authors explore the gaps between these groups and point toward ways t...
 
Measuring Reuse: A Cautionary Tale
Found in: IEEE Software
By Shari Lawrence Pfleeger
Issue Date:July 1996
pp. 118-127
<p>Many organizations look to reuse for large improvements in quality and productivity. But measuring reuse is difficult, to be attempted only after careful analysis of measurement and management goals. This article describes how to measure reuse and...
 
 1  2 Next >>