{"oa":"1","has_accepted_license":"1","file":[{"file_size":669105,"file_id":"6034","creator":"hsiemes","date_created":"2018-12-07T11:43:06Z","content_type":"application/pdf","file_name":"ECIS - Proceedings version1.pdf","date_updated":"2018-12-13T15:08:50Z","access_level":"open_access","relation":"main_file"}],"ddc":["000"],"status":"public","date_created":"2018-11-13T14:45:25Z","file_date_updated":"2018-12-13T15:08:50Z","author":[{"first_name":"Emrah","full_name":"Yasasin, Emrah","last_name":"Yasasin"},{"last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido","id":"72850"}],"department":[{"_id":"277"}],"user_id":"61579","year":"2015","_id":"5541","language":[{"iso":"eng"}],"title":"Requirements for IT Security Metrics - An Argumentation Theory Based Approach","type":"conference","citation":{"mla":"Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” 23rd European Conference on Information Systems (ECIS 2015), 2015.","bibtex":"@inproceedings{Yasasin_Schryen_2015, title={Requirements for IT Security Metrics - An Argumentation Theory Based Approach}, booktitle={23rd European Conference on Information Systems (ECIS 2015)}, author={Yasasin, Emrah and Schryen, Guido}, year={2015} }","ieee":"E. Yasasin and G. Schryen, “Requirements for IT Security Metrics - An Argumentation Theory Based Approach,” in 23rd European Conference on Information Systems (ECIS 2015), 2015.","chicago":"Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” In 23rd European Conference on Information Systems (ECIS 2015), 2015.","apa":"Yasasin, E., & Schryen, G. (2015). Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In 23rd European Conference on Information Systems (ECIS 2015).","short":"E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems (ECIS 2015), 2015.","ama":"Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015). ; 2015."},"extern":"1","publication":"23rd European Conference on Information Systems (ECIS 2015)","date_updated":"2022-01-06T07:01:58Z"}