Shari Lawrence Pfleeger
#194,919
Most Influential Person Across History
Shari Lawrence Pfleeger's AcademicInfluence.com Rankings
Shari Lawrence Pfleegercomputer-science Degrees
Computer Science
#8291
Historical Rank
Software Engineering
#215
Historical Rank
Database
#5128
Historical Rank

Download Badge
Computer Science
Why Is Shari Lawrence Pfleeger Influential?
(Suggest an Edit or Addition)Shari Lawrence Pfleeger's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Software Metrics : A Rigorous and Practical Approach (1998) (3190)
- Preliminary Guidelines for Empirical Research in Software Engineering (2002) (1577)
- Software metrics (2nd ed.): a rigorous and practical approach (1997) (807)
- Towards a Framework for Software Measurement Validation (1995) (653)
- Case Studies for Method and Tool Evaluation (1995) (653)
- Software Quality: The Elusive Target (1996) (646)
- Personal Opinion Surveys (2008) (384)
- Principles of survey research: part 1: turning lemons into lemonade (2001) (335)
- Science and substance: a challenge to software engineers (1994) (329)
- Principles of survey research: part 5: populations and samples (2002) (327)
- Principles of survey research part 2: designing a survey (2002) (236)
- Principles of survey research part 4: questionnaire evaluation (2002) (216)
- Principles of survey research: part 3: constructing a survey instrument (2002) (213)
- An empirical study of maintenance and development estimation accuracy (2002) (209)
- Leveraging behavioral science to mitigate cyber security risk (2012) (204)
- Going Spear Phishing: Exploring Embedded Training and Awareness (2014) (199)
- Experimental design and analysis in software engineering (1995) (168)
- Principles of survey research part 6: data analysis (2003) (168)
- Software Metrics (1991) (144)
- Understanding and improving technology transfer in software engineering (1999) (142)
- Lessons learned in building a corporate metrics program (1993) (137)
- Software Engineering: The Production of Quality Software (1987) (126)
- Investigating the Influence of Formal Methods (1997) (125)
- Security in Computing, 4th Edition (2006) (124)
- A framework for software maintenance metrics (1990) (122)
- Status Report on Software Measurement (1997) (105)
- Why Measuring Security Is Hard (2010) (102)
- Software engineering - theory and practice (3. ed.) (2006) (93)
- Evaluating software engineering standards (1994) (88)
- Insiders Behaving Badly (2008) (87)
- Insiders Behaving Badly: Addressing Bad Actors and Their Actions (2010) (86)
- From Weakest Link to Security Hero: Transforming Staff Security Behavior (2014) (79)
- Albert Einstein and Empirical Software Engineering (1999) (78)
- Marketing Technology to Software Practitioners (2000) (74)
- Software metrics in the process maturity framework (1990) (61)
- Software Measurement for DoD Systems: Recommendations for Initial Core Measures. (1992) (60)
- Making Reuse Work At Hewlett-Packard (1995) (56)
- Economics of reuse: issues and alternatives (1990) (56)
- Executive mentoring: what makes it work? (1995) (55)
- Software Cost Estimation and Sizing Methods, Issues, and Guidelines (2005) (54)
- Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (2012) (54)
- Design and analysis in software engineering: the language of case studies and formal experiments (1994) (51)
- Risky business (2000) (50)
- Canning SPAM: Proposed solutions to unwanted email (2005) (49)
- A methodology for penetration testing (1989) (49)
- Soup or Art? The Role of Evidential Force in Empirical Software Engineering (2005) (48)
- Barriers to Usable Security? Three Organizational Case Studies (2016) (44)
- Applying Software Metrics (1996) (44)
- Introduction to discrete structures (1985) (42)
- Software Metrics: Progress after 25 Years? (2008) (42)
- Software Engineering: Theory and Practice (1998) (40)
- Software metrics - a practical and rigorous approach (2. ed.) (1996) (38)
- Measurement based process improvement (1994) (37)
- Experimental design and analysis in software engineering, part 5: analyzing the data (1995) (36)
- Addressing the Insider Threat (2009) (35)
- The Nature of System Change (1998) (34)
- Maturity, models, and goals: How to build a metrics plan (1995) (33)
- Measuring Reuse: A Cautionary Tale (1996) (33)
- Cybersecurity Economic Issues: Clearing the Path to Good Practice (2008) (31)
- Security through Information Risk Management (2009) (30)
- Guest Editors' Introduction: Shouldn't All Security Be Usable? (2011) (30)
- Experimental design and analysis in software engineering: Part 2: how to set up and experiment (1995) (28)
- Experimental design and analysis in software engineering, part 4: choosing an experimental design (1995) (25)
- Software engineering: the production of quality software (2nd ed.) (1991) (25)
- Experimental Design and Analysis in Software Engineering: Types of Experimental Design (1995) (24)
- Student Study Guide for Software Engineering: Theory and Practice (2009) (24)
- Reply to: Comments on "Toward a Framework for Software Measurement Validation" (1997) (24)
- Global Technology Revolution 2020 (2006) (23)
- Useful Cybersecurity Metrics (2009) (23)
- Making the Best Use of Cybersecurity Economic Models (2009) (22)
- Model of software effort and productivity (1991) (22)
- Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities (2004) (20)
- Increasing the enrollment of women in computer science (2001) (19)
- A framework for security requirements (1991) (17)
- Improving the Cost Estimation of Space Systems: Past Lessons and Future Recommendations (2008) (16)
- Solid Software (2001) (15)
- Making software development investment decisions (1998) (15)
- Guest Editor's Introduction: Assessing Measurement (1997) (15)
- Evaluation and Recommendations for Improvement of the Department of Defense Small Business Innovation Research (SBIR) Program (2006) (15)
- Experimental Design and Analysis in Software Engineering Part 3 : Types of Experimental Design (2002) (14)
- Technology Transfer of Federally Funded R&D: Perspectives from a Forum (2003) (14)
- Software Engineering: Theory and Practice (2nd Edition) (2016) (14)
- Collecting the Dots: Problem Formulation and Solution Elements (2004) (14)
- Software Engineering Decision Support (2007) (13)
- Software metrics tool kit: support for selection, collection and analysis (1991) (13)
- Software Cost Estimation and Sizing Methods (2005) (12)
- Security Decision Support Challenges in Data Collection and Use (2010) (11)
- What Software Engineering Can Learn from Soccer (2002) (10)
- Why We Won't Review Books by Hackers (2006) (10)
- The Global Technology Revolution 2020: Executive Summary: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications (2006) (10)
- Harmonizing privacy with security principles and practices (2009) (10)
- Technology Transfer of Federally Funded R&D (2003) (9)
- Analyzing the Evolution of Large-Scale Software: Issue Overviews (2005) (9)
- Security in Computing ( Third edition ) by Charles Pfleeger and Shari Pfleeger (2006) (9)
- Security Measurement Steps, Missteps, and Next Steps (2012) (9)
- The Global Technology Revolution 2020: Executive Summary (2006) (9)
- Using multiple metrics for analysis of improvement (1992) (8)
- Revisiting US-VISIT: U.S. Immigration Processes, Concerns, and Consequences (2006) (8)
- what we have yet to learn about software risk management (2000) (7)
- Analyzing the Evolution of Large-Scale Software (2005) (7)
- I'll Buy That! Cybersecurity in the Internet Marketplace (2007) (7)
- Software engineering : theory and practice / Shari Lawrence Pfleeger (2001) (6)
- Recommendations for an Initial Set of Software Metrics (1989) (6)
- Anatomy of an Intrusion (2010) (6)
- Guest Editors' Introduction: Software as a Business (2011) (6)
- Improving the Cost Estimation of Space Systems (2008) (6)
- Process maturity as framework for CASE tool selection (1991) (5)
- Security in Computing: 5th Edition (2018) (5)
- Comments on (quote)Towards a framework for software measurement validation(quote) (1997) (5)
- The Eyes Have It: Surveillance and How It Evolved (2014) (5)
- Experimentation in Software Engineering (1997) (5)
- Addressing Information Risk in Turbulent Times (2011) (5)
- Decision-Making in Software Engineering (2001) (4)
- Improving Cybersecurity Incident Response Team (CSIRT) Skills, Dynamics and Effectiveness (2017) (4)
- New Year's Resolutions for Software Quality (2004) (4)
- Global Technology Revolution 2020: Technology Trends and Cross-Country Variation (2006) (4)
- Empirical Studies of Software Maintenance: A Report from WESS '97 (1998) (4)
- Choosing a Security Option: The InfoSecure Methodology (2008) (4)
- Guest Editors' Introduction: Managing Organizational Security (2007) (3)
- Searching for You. (2009) (3)
- Wavefront: a goal-driven requirements process model (1996) (3)
- Technology, Transparency, and Trust (2014) (3)
- Keynote: May The Force Be With You: The Role of Evidential Force in Empirical Software Engineering (2003) (3)
- Making Executive Mentoring Work in IT (2006) (3)
- Does Profiling Make Us More Secure? (2012) (2)
- Do Formal Methods Really Work (1997) (2)
- A transaction flow approach to software security certification for document handling systems (1988) (2)
- Do Formal Methods Improve Code Quality? (2002) (1)
- Albert Einstein and Empirical Software Engineering a Deceptively Ordered Universe (1999) (1)
- Technology Solutions for the Enterprise (2015) (1)
- Spooky Lessons (2007) (1)
- Collecting the dots (2004) (1)
- Erratum to "An empirical study of maintenance and development estimation accuracy" [The Journal of Systems and Software 64 (2002) 57-77] (2005) (1)
- Cybersecurity Economic Issues (2008) (1)
- Spider-Man, Hubris, and the Future of Security and Privacy (2015) (1)
- What Good Are Metrics? The Views of Industry and Academia (2001) (1)
- Learning from Other Disciplines (2015) (1)
- Securing Cyberspace : Is It Time to Rethink Our Strategy ? (1)
- Making change: understanding software technology transfer (1998) (1)
- Evaluating software technology (tutorial) (1997) (1)
- 2003 International conference on software maintenance: the architectural evolution of systems (2005) (1)
- Chapter 1 (1816) (0)
- Tutorial: Evaluating Softiare Technology (1997) (0)
- Making Change: The *Other* Components of Software Maintenance (1998) (0)
- Focus on Policy (2013) (0)
- New Artificial Intelligence Techniques in Software Engineering (2020) (0)
- Everything You Wanted to Know about Privacy (But Were Afraid to Ask) (2006) (0)
- Trust , Risk and Economic Benefits in Online Environments (2006) (0)
- Ramsey Theory: Learning about the Needle in the Haystack (2013) (0)
- Book Reviews (1906) (0)
- Guest Editors' Introduction the Scope of the Insider Threat Guest Editors' Introduction Promising Insider Research Guest Editors' Introduction (0)
- Toward A Cognitive Analysis of Insider Threats An Examination of User Password Choice (2009) (0)
- Software Everywhere (2016) (0)
- Toward A Cognitive Analysis of Insider Threats An Examination of User Password Choice (2009) (0)
- Personal Touch: Roles for Interpersonal Behavior, Trust and Cultural Differences in Models of Cyber Security Economics Decision-Making (2006) (0)
- Solid Software: Is It Rocket Science? (2002) (0)
- Measuring up: how to keep security metrics useful and realistic (2007) (0)
- Software Business (2018) (0)
- A Key to the Castle (2012) (0)
- Questionable Approaches To Process Improvement (1995) (0)
- Review of Software reuse: Architecture, process and organization for business success by Ivar Jacobson, Martin Griss, and Patrik Jonsson, Addison-Wesley publishing Co., Reading, MA, 1997 (1998) (0)
- Guest Editors' Introduction (2012) (0)
- Searching for You [Book reviews] (2009) (0)
- Foreword - A Social Science Perspective of Trust and Cyber Security (2017) (0)
- 4.2 Social Dynamics Metrics-Working Group Report (2015) (0)
- Book Reviews (2004) (0)
- In the News (1996) (0)
- Enlightened Security: Shedding Light on What Works and Why (2013) (0)
- Book Reviews (2004) (0)
- Cybersecurity Economic Issues: Corporate Approaches and Challenges to Decisionmaking (2008) (0)
- Checklists Reduce Uncertainties in Estimating Software Costs (2004) (0)
- New views of mature ideas on software What Makes Inspections Work? Competing methods show we have yet to identify the fundamental drivers of inspection costs and benefits. (1997) (0)
- The exact definition Ethics in Security Vulnerability Research (2010) (0)
- Revisiting US-VISIT (2006) (0)
- Expanding to Meet Readers' Needs (2014) (0)
- Lessons Learned by Our Editorial Board (2015) (0)
- Technology to Software (2000) (0)
- Quality Time: Guidelines for Applying Research Results (1997) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Shari Lawrence Pfleeger?
Shari Lawrence Pfleeger is affiliated with the following schools: