This collection contains the supplementary material for the research on automated security findings management.
It consists of insights on the methodology:The data model for each security finding (Data_Model)Some examples for the Webinterface pages (Webinterface_pages)Moreover, it contains data on the evaluation of the methodology:The interview slidedeck, to introduce the methodology (Interview_Slidedeck)The guide on how to conduct the interviews (Interview_Guide)The questionnaire for the reoccurring interviews (Questionnaire_Reoccurring)The questionnaire for the final interview (Questionnaire_Final)
It consists of insights on the methodology:The data model for each security finding (Data_Model)Some examples for the Webinterface pages (Webinterface_pages)Moreover, it contains data on the evaluation of the methodology:The interview slidedeck, to introduce the methodology (Interview_Slidedeck)The guide on how to conduct the interviews (Interview_Guide)The questionnaire for the reoccurring interviews (Questionnaire_Reoccurring)The questionnaire for the final interview (Questionnaire_Final)