default search action
Shari Lawrence Pfleeger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j95]Charles P. Pfleeger, Shari Lawrence Pfleeger:
Foreword - A Social Science Perspective of Trust and Cyber Security. Ingénierie des Systèmes d Inf. 22(1): 7-14 (2017) - 2016
- [j94]Shari Lawrence Pfleeger:
Software Everywhere. IEEE Secur. Priv. 14(1): 11 (2016) - [j93]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - 2015
- [j92]Shari Lawrence Pfleeger:
Learning from Other Disciplines. IEEE Secur. Priv. 13(4): 10-11 (2015) - [j91]Shari Lawrence Pfleeger:
Spider-Man, Hubris, and the Future of Security and Privacy. IEEE Secur. Priv. 13(6): 3-10 (2015) - [j90]Shari Lawrence Pfleeger:
Lessons Learned by Our Editorial Board. IEEE Secur. Priv. 13(6): 16-17 (2015) - 2014
- [j89]Deanna D. Caputo, Shari Lawrence Pfleeger, Jesse D. Freeman, M. Eric Johnson:
Going Spear Phishing: Exploring Embedded Training and Awareness. IEEE Secur. Priv. 12(1): 28-38 (2014) - [j88]Shari Lawrence Pfleeger:
The Eyes Have It: Surveillance and How It Evolved. IEEE Secur. Priv. 12(4): 74-79 (2014) - [j87]Shari Lawrence Pfleeger:
Expanding to Meet Readers' Needs. IEEE Secur. Priv. 12(5): 3-4 (2014) - [j86]Shari Lawrence Pfleeger:
Technology, Transparency, and Trust. IEEE Secur. Priv. 12(6): 3-5 (2014) - 2013
- [j85]Shari Lawrence Pfleeger:
Enlightened Security: Shedding Light on What Works and Why. IEEE Secur. Priv. 11(1): 3-4 (2013) - [j84]Shari Lawrence Pfleeger:
Ramsey Theory: Learning about the Needle in the Haystack. IEEE Secur. Priv. 11(3): 85-87 (2013) - [j83]Shari Lawrence Pfleeger:
Focus on Policy. IEEE Secur. Priv. 11(6): 3 (2013) - 2012
- [b5]Charles P. Pfleeger, Shari Lawrence Pfleeger:
Security in Computing, 4th Edition. Prentice Hall 2012, ISBN 978-0-13-239077-4, pp. I-XXIX, 1-845 - [b4]Charles P. Pfleeger, Shari Lawrence Pfleeger:
Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach. Prentice Hall 2012, ISBN 978-0-13-283940-2, pp. I-XXXVI, 1-795 - [j82]Shari Lawrence Pfleeger, Deanna D. Caputo:
Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31(4): 597-611 (2012) - [j81]Shari Lawrence Pfleeger, Cynthia E. Irvine, Mischel Kwon:
Guest Editors' Introduction. IEEE Secur. Priv. 10(2): 19-23 (2012) - [j80]Shari Lawrence Pfleeger:
A Key to the Castle. IEEE Secur. Priv. 10(3): 3 (2012) - [j79]Shari Lawrence Pfleeger:
Security Measurement Steps, Missteps, and Next Steps. IEEE Secur. Priv. 10(4): 5-9 (2012) - [j78]Shari Lawrence Pfleeger, Marc Rogers, Masooda N. Bashir, Kelly Caine, Deanna D. Caputo, Michael Losavio, Salvatore J. Stolfo:
Does Profiling Make Us More Secure? IEEE Secur. Priv. 10(4): 10-15 (2012) - 2011
- [j77]M. Eric Johnson, Shari Lawrence Pfleeger:
Addressing Information Risk in Turbulent Times. IEEE Secur. Priv. 9(1): 49-57 (2011) - [j76]Mary Frances Theofanos, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Shouldn't All Security Be Usable? IEEE Secur. Priv. 9(2): 12-17 (2011) - [j75]John M. Favaro, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Software as a Business. IEEE Softw. 28(4): 22-25 (2011) - 2010
- [j74]Ian P. Cook, Shari Lawrence Pfleeger:
Security Decision Support Challenges in Data Collection and Use. IEEE Secur. Priv. 8(3): 28-35 (2010) - [j73]Shari Lawrence Pfleeger, Robert K. Cunningham:
Why Measuring Security Is Hard. IEEE Secur. Priv. 8(4): 46-54 (2010) - [j72]Shari Lawrence Pfleeger:
Anatomy of an Intrusion. IT Prof. 12(4): 20-28 (2010) - [j71]Shari Lawrence Pfleeger, Joel B. Predd, Jeffrey Hunker, Carla Bulford:
Insiders behaving badly: addressing bad actors and their actions. IEEE Trans. Inf. Forensics Secur. 5(1): 169-179 (2010)
2000 – 2009
- 2009
- [b3]Shari Lawrence Pfleeger, Joanne M. Atlee:
Software engineering - theory and practice (4. ed.). Pearson Education 2009, ISBN 978-0-13-814181-3, pp. 1-782 - [j70]Shari Lawrence Pfleeger, Charles P. Pfleeger:
Harmonizing privacy with security principles and practices. IBM J. Res. Dev. 53(2): 6 (2009) - [j69]Shari Lawrence Pfleeger:
Searching for You. IEEE Secur. Priv. 7(2): 15 (2009) - [j68]M. Eric Johnson, Eric Goetz, Shari Lawrence Pfleeger:
Security through Information Risk Management. IEEE Secur. Priv. 7(3): 45-52 (2009) - [j67]Rachel Rue, Shari Lawrence Pfleeger:
Making the Best Use of Cybersecurity Economic Models. IEEE Secur. Priv. 7(4): 52-60 (2009) - [j66]Shari Lawrence Pfleeger, Salvatore J. Stolfo:
Addressing the Insider Threat. IEEE Secur. Priv. 7(6): 10-13 (2009) - [j65]Shari Lawrence Pfleeger:
Useful Cybersecurity Metrics. IT Prof. 11(3): 38-45 (2009) - 2008
- [j64]Joel B. Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford:
Insiders Behaving Badly. IEEE Secur. Priv. 6(4): 66-70 (2008) - [j63]Shari Lawrence Pfleeger, Thomas Ciszek:
Choosing a Security Option: The InfoSecure Methodology. IT Prof. 10(5): 46-52 (2008) - [j62]Shari Lawrence Pfleeger, Rachel Rue:
Cybersecurity Economic Issues: Clearing the Path to Good Practice. IEEE Softw. 25(1): 35-42 (2008) - [j61]Shari Lawrence Pfleeger:
Software Metrics: Progress after 25 Years? IEEE Softw. 25(6): 32-34 (2008) - [p1]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Personal Opinion Surveys. Guide to Advanced Empirical Software Engineering 2008: 63-92 - 2007
- [j60]Shari Lawrence Pfleeger, Roland L. Trope, Charles C. Palmer:
Guest Editors' Introduction: Managing Organizational Security. IEEE Secur. Priv. 5(3): 13-15 (2007) - [j59]Shari Lawrence Pfleeger, Martin Libicki, Michael Webber:
I'll Buy That! Cybersecurity in the Internet Marketplace. IEEE Secur. Priv. 5(3): 25-31 (2007) - [j58]Shari Lawrence Pfleeger:
Spooky Lessons. IEEE Secur. Priv. 5(5): 7 (2007) - [c12]Shari Lawrence Pfleeger:
Measuring up: how to keep security metrics useful and realistic. QoP 2007: 21 - [c11]Günther Ruhe, Shari Lawrence Pfleeger:
Software Engineering Decision Support. HICSS 2007: 282 - 2006
- [b2]Shari Lawrence Pfleeger, Joanne M. Atlee:
Software engineering - theory and practice (3. ed.). Ellis Horwood 2006, ISBN 978-0-13-198461-5, pp. I-XIX, 1-716 - [j57]Shari Lawrence Pfleeger:
Everything You Wanted to Know about Privacy (But Were Afraid to Ask). IEEE Secur. Priv. 4(3): 5 (2006) - [j56]Charles P. Pfleeger, Shari Lawrence Pfleeger:
Why We Won't Review Books by Hackers. IEEE Secur. Priv. 4(4): 9-9 (2006) - 2005
- [j55]Shari Lawrence Pfleeger, Gabrielle Bloom:
Canning Spam: Proposed Solutions to Unwanted Email. IEEE Secur. Priv. 3(2): 40-47 (2005) - [j54]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Beth McColl, Suzanne Eagan:
Erratum to "An empirical study of maintenance and development estimation accuracy" [The Journal of Systems and Software 64 (2002) 57-77]. J. Syst. Softw. 74(2): 227-227 (2005) - [j53]Shari Lawrence Pfleeger, Chris Verhoef, Johannes C. van Vliet:
Analyzing the Evolution of Large-Scale Software. J. Softw. Maintenance Res. Pract. 17(1): 1-2 (2005) - [j52]Shari Lawrence Pfleeger:
Soup or Art? The Role of Evidential Force in Empirical Software Engineering. IEEE Softw. 22(1): 66-73 (2005) - 2004
- [j51]Shari Lawrence Pfleeger:
Book Reviews. IEEE Secur. Priv. 2(3): 7 (2004) - [j50]Victor R. Basili, Barry W. Boehm, Al Davis, Watts S. Humphrey, Nancy G. Leveson, Nancy R. Mead, John D. Musa, David Lorge Parnas, Shari Lawrence Pfleeger, Elaine J. Weyuker:
New Year's Resolutions for Software Quality. IEEE Softw. 21(1): 12-13 (2004) - [c10]Charles Howell, Sofia Guerra, Shari Lawrence Pfleeger, Victoria Stavridou-Coleman:
Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities. DSN 2004: 903 - 2003
- [j49]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Principles of survey research part 6: data analysis. ACM SIGSOFT Softw. Eng. Notes 28(2): 24-27 (2003) - [c9]Shari Lawrence Pfleeger:
Keynote: May The Force Be With You: The Role of Evidential Force in Empirical Software Engineering. IEEE METRICS 2003 - 2002
- [j48]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Beth McColl, Suzanne Eagan:
An empirical study of maintenance and development estimation accuracy. J. Syst. Softw. 64(1): 57-77 (2002) - [j47]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Principles of survey research part 2: designing a survey. ACM SIGSOFT Softw. Eng. Notes 27(1): 18-20 (2002) - [j46]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Principles of survey research: part 3: constructing a survey instrument. ACM SIGSOFT Softw. Eng. Notes 27(2): 20-24 (2002) - [j45]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Principles of survey research part 4: questionnaire evaluation. ACM SIGSOFT Softw. Eng. Notes 27(3): 20-23 (2002) - [j44]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Principles of survey research: part 5: populations and samples. ACM SIGSOFT Softw. Eng. Notes 27(5): 17-20 (2002) - [j43]Shari Lawrence Pfleeger:
What Software Engineering Can Learn from Soccer. IEEE Softw. 19(6): 64-65 (2002) - [j42]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Lesley Pickard, Peter W. Jones, David C. Hoaglin, Khaled El Emam, Jarrett Rosenberg:
Preliminary Guidelines for Empirical Research in Software Engineering. IEEE Trans. Software Eng. 28(8): 721-734 (2002) - [c8]Shari Lawrence Pfleeger:
Solid Software: Is It Rocket Science? ECSQ 2002: 7-12 - 2001
- [j41]Shari Lawrence Pfleeger, Barbara A. Kitchenham:
Principles of survey research: part 1: turning lemons into lemonade. ACM SIGSOFT Softw. Eng. Notes 26(6): 16-18 (2001) - [c7]Shari Lawrence Pfleeger:
What Good Are Metrics? The Views of Industry and Academia. IEEE METRICS 2001: 146- - [c6]Shari Lawrence Pfleeger:
Decision-Making in Software Engineering. SEKE 2001: 179 - [c5]Shari Lawrence Pfleeger, Pat Teller, Sheila E. Castaneda, Manda Wilson, Rowan Lindley:
Increasing the enrollment of women in computer science. SIGCSE 2001: 386-387 - 2000
- [j40]Shari Lawrence Pfleeger:
Risky business: what we have yet to learn about risk management. J. Syst. Softw. 53(3): 265-273 (2000) - [j39]Shari Lawrence Pfleeger, Winifred Menezes:
Marketing Technology to Software Practitioners. IEEE Softw. 17(1): 27-33 (2000) - [c4]Shari Lawrence Pfleeger, Martin J. Shepperd, Roseanne Tesoriero:
Decisions and Delphi: The Dynamics of Group Estimation. SBES 2000: 3-15
1990 – 1999
- 1999
- [j38]Shari Lawrence Pfleeger:
Albert Einstein and Empirical Software Engineering. Computer 32(10): 32-37 (1999) - [j37]Shari Lawrence Pfleeger:
Understanding and improving technology transfer in software engineering. J. Syst. Softw. 47(2-3): 111-124 (1999) - 1998
- [j36]Lionel C. Briand, Filippo Lanubile, Shari Lawrence Pfleeger, Gregg Rothermel, Norman F. Schneidewind:
Empirical Studies of Software Maintenance: A Report from WESS '97. Empir. Softw. Eng. 3(3): 299-307 (1998) - [j35]John M. Favaro, Shari Lawrence Pfleeger:
Making software development investment decisions. ACM SIGSOFT Softw. Eng. Notes 23(5): 69-74 (1998) - [j34]Shari Lawrence Pfleeger:
The Nature of System Change. IEEE Softw. 15(3): 87-90 (1998) - [c3]Shari Lawrence Pfleeger:
Making Change: The Other Components of Software Maintenance. ICSM 1998: 2- - 1997
- [j33]Shari Lawrence Pfleeger:
Experimentation in Software Engineering. Adv. Comput. 44: 127-167 (1997) - [j32]Shari Lawrence Pfleeger:
Desert Island Column. Autom. Softw. Eng. 4(2): 243-245 (1997) - [j31]Shari Lawrence Pfleeger, Les Hatton:
Investigating the Influence of Formal Methods. Computer 30(2): 33-43 (1997) - [j30]Barbara A. Kitchenham, Pearl Brereton, David Budgen, Stephen G. Linkman, Vicki L. Almstrum, Shari Lawrence Pfleeger:
Evaluation and assessment in software engineering. Inf. Softw. Technol. 39(11): 731-734 (1997) - [j29]Shari Lawrence Pfleeger:
Guest Editor's Introduction: Assessing Measurement. IEEE Softw. 14(2): 25-26 (1997) - [j28]Shari Lawrence Pfleeger, D. Ross Jeffery, Bill Curtis, Barbara A. Kitchenham:
Status Report on Software Measurement. IEEE Softw. 14(2): 33-44 (1997) - [j27]Shari Lawrence Pfleeger:
Quality Time: Guidelines for Applying Research Results. IEEE Softw. 14(3): 102-104 (1997) - [j26]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Norman E. Fenton:
Reply to: Comments on "Toward a Framework for Software Measurement Validation". IEEE Trans. Software Eng. 23(3): 189 (1997) - [c2]Shari Lawrence Pfleeger:
Evaluating Software Technology (Tutorial). ICSE 1997: 651-652 - 1996
- [b1]Norman E. Fenton, Shari Lawrence Pfleeger:
Software metrics - a practical and rigorous approach (2. ed.). International Thomson 1996, ISBN 978-1-85032-275-7, pp. I-XII, 1-638 - [j25]Mary Frances Theofanos, Shari Lawrence Pfleeger:
Wavefront: a goal-driven requirements process model. Inf. Softw. Technol. 38(8): 507-519 (1996) - [j24]Barbara A. Kitchenham, Shari Lawrence Pfleeger:
Software Quality: The Elusive Target. IEEE Softw. 13(1): 12-21 (1996) - [j23]Stephen Barlas, Michael J. Lutz, Shari Lawrence Pfleeger:
In the News. IEEE Softw. 13(1): 104-106 (1996) - [j22]Shari Lawrence Pfleeger:
Measuring Reuse: A Cautionary Tale. IEEE Softw. 13(4): 118-127 (1996) - 1995
- [j21]Shari Lawrence Pfleeger:
Experimental Design and Analysis in Software Engineering. Ann. Softw. Eng. 1: 219-253 (1995) - [j20]Shari Lawrence Pfleeger, Norma Mertz:
Executive Mentoring - What Makes It Work? Commun. ACM 38(1): 63-73 (1995) - [j19]Shari Lawrence Pfleeger:
Maturity, models, and goals: How to build a metrics plan. J. Syst. Softw. 31(2): 143-155 (1995) - [j18]Shari Lawrence Pfleeger:
Experimental design and analysis in software engineering: Part 2: how to set up and experiment. ACM SIGSOFT Softw. Eng. Notes 20(1): 22-26 (1995) - [j17]Shari Lawrence Pfleeger:
Experimental Design and Analysis in Software Engineering: Types of Experimental Design. ACM SIGSOFT Softw. Eng. Notes 20(2): 14-16 (1995) - [j16]Shari Lawrence Pfleeger:
Experimental design and analysis in software engineering, part 4: choosing an experimental design. ACM SIGSOFT Softw. Eng. Notes 20(3): 13-15 (1995) - [j15]Shari Lawrence Pfleeger:
Experimental design and analysis in software engineering, part 5: analyzing the data. ACM SIGSOFT Softw. Eng. Notes 20(5): 14-17 (1995) - [j14]Martin L. Griss, Marty Wosser, Shari Lawrence Pfleeger:
Making Reuse Work At Hewlett-Packard. IEEE Softw. 12(1): 105-107 (1995) - [j13]Barbara A. Kitchenham, Lesley Pickard, Shari Lawrence Pfleeger:
Case Studies for Method and Tool Evaluation. IEEE Softw. 12(4): 52-62 (1995) - [j12]Shari Lawrence Pfleeger:
Questionable Approaches To Process Improvement. IEEE Softw. 12(5): 105-111 (1995) - [j11]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Norman E. Fenton:
Towards a Framework for Software Measurement Validation. IEEE Trans. Software Eng. 21(12): 929-943 (1995) - 1994
- [j10]Shari Lawrence Pfleeger, Norman E. Fenton, Stella Page:
Evaluating Software Engineering Standards. Computer 27(9): 71-79 (1994) - [j9]Shari Lawrence Pfleeger, Terry Bollinger:
The economics of reuse: new approaches to modelling and assessing cost. Inf. Softw. Technol. 36(8): 475-484 (1994) - [j8]Shari Lawrence Pfleeger:
Design and analysis in software engineering: the language of case studies and formal experiments. ACM SIGSOFT Softw. Eng. Notes 19(4): 16-20 (1994) - [j7]Shari Lawrence Pfleeger, H. Dieter Rombach:
Measurement Based Process Improvement. IEEE Softw. 11(4): 8-11 (1994) - [j6]Norman E. Fenton, Shari Lawrence Pfleeger, Robert L. Glass:
Science and Substance: A Challenge to Software Engineers. IEEE Softw. 11(4): 86-95 (1994) - 1993
- [j5]Shari Lawrence Pfleeger:
Lessons Learned in Building a Corporate Metrics Program. IEEE Softw. 10(3): 67-74 (1993) - 1991
- [j4]Shari Lawrence Pfleeger:
A framework for security requirements. Comput. Secur. 10(6): 515-523 (1991) - 1990
- [j3]Shari Lawrence Pfleeger, Clement McGowan:
Software metrics in the process maturity framework. J. Syst. Softw. 12(3): 255-261 (1990) - [c1]Shari Lawrence Pfleeger, Shawn A. Bohner:
A framework for software maintenance metrics. ICSM 1990: 320-327
1980 – 1989
- 1989
- [j2]Charles P. Pfleeger, Shari Lawrence Pfleeger, Mary Frances Theofanos:
A methodology for penetration testing. Comput. Secur. 8(7): 613-620 (1989) - 1988
- [j1]Charles P. Pfleeger, Shari Lawrence Pfleeger:
A transaction flow approach to software security certification for document handling systems. Comput. Secur. 7(5): 495-502 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint