{"id":"https://openalex.org/W4401722399","doi":"https://doi.org/10.1145/3688806","title":"On NVD Users\u2019 Attitudes, Experiences, Hopes, and Hurdles","display_name":"On NVD Users\u2019 Attitudes, Experiences, Hopes, and Hurdles","publication_year":2024,"publication_date":"2024-08-21","ids":{"openalex":"https://openalex.org/W4401722399","doi":"https://doi.org/10.1145/3688806"},"language":"en","primary_location":{"id":"doi:10.1145/3688806","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688806","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1145/3688806","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062028932","display_name":"Julia Wunder","orcid":"https://orcid.org/0009-0006-6545-7513"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Julia Wunder","raw_affiliation_strings":["IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114031439","display_name":"A. Corona","orcid":null},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alan Corona","raw_affiliation_strings":["IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102826069","display_name":"Andreas Hammer","orcid":"https://orcid.org/0000-0001-5397-1685"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Hammer","raw_affiliation_strings":["IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040519207","display_name":"Zinaida Benenson","orcid":"https://orcid.org/0009-0006-7158-0219"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Zinaida Benenson","raw_affiliation_strings":["IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"IT Security Infrastructures Lab, Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062028932"],"corresponding_institution_ids":["https://openalex.org/I181369854"],"apc_list":null,"apc_paid":null,"fwci":3.0325,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92707946,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"5","issue":"3","first_page":"1","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8587523698806763},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5729923248291016},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.559018075466156},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5392874479293823},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47685205936431885},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.417524516582489},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3700486421585083},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3355054259300232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2667132019996643},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20966795086860657},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.18203455209732056}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8587523698806763},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5729923248291016},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.559018075466156},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5392874479293823},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47685205936431885},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.417524516582489},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3700486421585083},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3355054259300232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2667132019996643},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20966795086860657},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.18203455209732056},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3688806","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688806","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2408.10695","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2408.10695","pdf_url":"https://arxiv.org/pdf/2408.10695","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3688806","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688806","pdf_url":null,"source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1531912241","display_name":null,"funder_award_id":"393541319/GRK2475/2-2024","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G2580651502","display_name":null,"funder_award_id":"16KIS1271K","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G2857958101","display_name":null,"funder_award_id":"393541319","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G3564768260","display_name":null,"funder_award_id":"9/GRK","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5106512922","display_name":null,"funder_award_id":"Deutsche Forschungsgemeinschaft (DFG","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5168466499","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G762232396","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G8330397625","display_name":null,"funder_award_id":"Funding","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W110007310","https://openalex.org/W2022913925","https://openalex.org/W2164777277","https://openalex.org/W2911255072","https://openalex.org/W2913576447","https://openalex.org/W3000845437","https://openalex.org/W3017863658","https://openalex.org/W3108034107","https://openalex.org/W3130623539","https://openalex.org/W3195850962","https://openalex.org/W3214263053","https://openalex.org/W4210556785","https://openalex.org/W4285502511","https://openalex.org/W4300869678","https://openalex.org/W4402264535"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"The":[0,32,103],"National":[1],"Vulnerability":[2],"Database":[3],"(NVD)":[4],"is":[5,11,34,64,109,185],"a":[6,46,89,97,128],"major":[7],"vulnerability":[8,42,54,70],"database":[9],"that":[10,106],"free":[12],"to":[13,48,150,171],"use":[14],"for":[15,41],"everyone.":[16],"It":[17],"provides":[18],"information":[19,43],"about":[20,66,121],"vulnerabilities":[21],"and":[22,30,44,76,96,112,124],"further":[23],"useful":[24],"resources":[25],"such":[26,174],"as":[27,37,45,127,175],"linked":[28],"advisories":[29],"patches.":[31],"NVD":[33,58,108,123,162,184],"often":[35,113],"considered":[36],"the":[38,50,57,107,122,152,157,166,176,183],"central":[39],"source":[40],"help":[47],"improve":[49],"resource-intensive":[51],"process":[52],"of":[53,165],"management.":[55],"Although":[56],"receives":[59],"much":[60],"public":[61],"attention,":[62],"little":[63],"known":[65],"its":[67],"usage":[68],"in":[69],"management,":[71],"users\u2019":[72],"attitudes":[73],"toward":[74],"it":[75,126],"whether":[77],"they":[78],"encounter":[79],"any":[80],"problems":[81,153,167,173],"during":[82],"usage.":[83],"We":[84],"explored":[85],"these":[86],"questions":[87],"using":[88],"preliminary":[90],"interview":[91],"study":[92],"with":[93,100,159],"seven":[94],"people,":[95],"follow-up":[98],"survey":[99],"71":[101],"participants.":[102],"results":[104,158],"show":[105],"consulted":[110],"regularly":[111],"aids":[114],"decision":[115],"making.":[116],"Generally,":[117],"users":[118,134],"are":[119],"positive":[120],"perceive":[125],"helpful,":[129],"clearly":[130],"structured":[131],"tool.":[132],"But":[133],"also":[135],"faced":[136],"issues:":[137],"missing":[138],"or":[139,144,179],"incorrect":[140],"entries,":[141],"incomplete":[142],"descriptions":[143],"incomprehensible":[145],"CVSS":[146],"ratings.":[147],"In":[148],"order":[149],"identify":[151],"origins,":[154],"we":[155],"discussed":[156],"two":[160],"senior":[161],"members.":[163],"Many":[164],"can":[168],"be":[169],"attributed":[170],"higher-level":[172],"CVE":[177],"List":[178],"limited":[180],"resources.":[181],"Nevertheless,":[182],"working":[186],"on":[187],"improving":[188],"existing":[189],"problems.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
