Personal information

Activities

Employment (1)

Carnegie Mellon University: Pittsburgh, PA, US

1990 to present | Principal Researcher and Fellow (Software Engineering Institute)
Employment
Source: Self-asserted source
Nancy Mead

Education and qualifications (1)

New York University: New York, New York, US

1983 | PhD Mathematics (Tandon Engineering School)
Education
Source: Self-asserted source
Nancy Mead

Professional activities (4)

IEEE: New York, NY, US

Life Fellow
Membership
Source: Self-asserted source
Nancy Mead

IEEE Computer Society: Washington, DC, US

2015 | Distinguished Education Award (Technical Council on Software Engineering)
Distinction
Source: Self-asserted source
Nancy Mead

Association for Computing Machinery: New York, NY, US

2009 | Distinguished Educator
Distinction
Source: Self-asserted source
Nancy Mead

IEEE: New York, NY, US

2006 | Fellow
Distinction
Source: Self-asserted source
Nancy Mead

Works (50 of 81)

Items per page:
Page 1 of 2

Open Source Software: The Ultimate in Reuse or a Risk Not Worth Taking?

Computer
2025-02 | Journal article
Contributors: Nancy R. Mead; Carol Woody; Scott Hissam
Source: check_circle
Crossref

Teaching Secure Acquisition in Higher Education

IEEE Security & Privacy
2020-07 | Journal article
Contributors: Dan Shoemaker; Nancy R. Mead; Anne Kohnke
Source: check_circle
Crossref

A Standard Best Practice Approach to Acquisition of Secure ICT Products

2014 | Other
DOI:

10.1080/07366981.2014.915647

EID:

2-s2.0-84902989815

Contributors: Shoemaker, D.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Evaluating software assurance knowledge and competency of acquisition professionals

2014 | Journal article
EID:

2-s2.0-84908885674

Contributors: Shoemaker, D.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Message from the chairs

2014 | Conference paper
DOI:

10.1109/ESPRE.2014.6890519

EID:

2-s2.0-84908626436

Contributors: Beckers, K.; Faily, S.; Mead, N.; Lee, S.-W.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

A history of the international requirements engineering conference (RE)RE@21

2013 | Conference paper
DOI:

10.1109/RE.2013.6636721

EID:

2-s2.0-84891045269

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Building a body of knowledge for ICT supply chain risk management

2013 | Journal article
EID:

2-s2.0-84876521860

Contributors: Shoemaker, D.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Building security in: A road to competency

2013 | Journal article
DOI:

10.1109/MSP.2013.109

EID:

2-s2.0-84886545348

Contributors: Hilburn, T.B.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Building security in: Preparing for a software security career

2013 | Journal article
DOI:

10.1109/MSP.2013.139

EID:

2-s2.0-84890931497

Contributors: Mead, N.R.; Hilburn, T.B.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

The software assurance competency model: A roadmap to enhance individual professional capability

2013 | Conference paper
DOI:

10.1109/CSEET.2013.6595243

EID:

2-s2.0-84884948756

Contributors: Mead, N.R.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Measuring the software security requirements engineering process

2012 | Conference paper
DOI:

10.1109/COMPSACW.2012.107

EID:

2-s2.0-84870794746

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Combining security and privacy in requirements engineering

2011 | Book
DOI:

10.4018/978-1-61350-507-6.ch011

EID:

2-s2.0-84898140241

Contributors: Abu-Nimeh, S.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Foundations for software assurance

2011 | Conference paper
DOI:

10.1109/HICSS.2012.287

EID:

2-s2.0-84857983520

Contributors: Woody, C.; Mead, N.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Getting secure software assurance knowledge into conventional practice: Three educational initiatives

2011 | Conference paper
DOI:

10.1109/COMPSAC.2011.32

EID:

2-s2.0-80054974299

Contributors: Mead, N.R.; Laird, L.M.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Taking our eyes off the ball: Has fighting cyber crime in the US left us ill-prepared for cyber war?

2011 | Journal article
EID:

2-s2.0-79958708090

Contributors: Ingalsbe, J.A.; Shoemaker, D.; Mead, N.R.; Meier, W.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

The development of a graduate curriculum for software assurance

2011 | Conference paper
EID:

2-s2.0-84870349487

Contributors: Ardis, M.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

A look at "software security engineering: A guide for project managers"©

2010 | Journal article
EID:

2-s2.0-77949817236

Contributors: Allen, J.H.; Ellison, R.J.; Mead, N.R.; Barnum, S.; McGraw, G.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Advancing software assurance with public-private collaboration

2010 | Other
DOI:

10.1109/MC.2010.247

EID:

2-s2.0-77956566100

Contributors: Mead, N.R.; Jarzombek, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Combining privacy and security risk assessment in Security Quality Requirements Engineering

2010 | Conference paper
EID:

2-s2.0-77957962304

Contributors: Abu-Nimeh, S.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Defining the discipline of secure software assurance: Initial findings from the national software assurance repository

2010 | Conference paper
DOI:

10.1109/HICSS.2010.132

EID:

2-s2.0-77951743547

Contributors: Shoemaker, D.; Ingalsbe, J.; Barrios, R.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Two initiatives for disseminating software assurance knowledge

2010 | Journal article
EID:

2-s2.0-77956754447

Contributors: Mead, N.R.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

A study of the impact on students understanding cross cultural differences in software engineering work

2009 | Conference paper
DOI:

10.1109/COMPSAC.2009.97

EID:

2-s2.0-70449631501

Contributors: Mead, N.R.; Drommi, A.; Shoemaker, D.; Ingalsbe, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Ensuring cost efficient and secure software through student case studies in risk and requirements prioritization

2009 | Conference paper
DOI:

10.1109/HICSS.2009.193

EID:

2-s2.0-63349109262

Contributors: Mead, N.R.; Shoemaker, D.; Ingalsbe, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Integrating privacy requirements into security requirements engineering

2009 | Conference paper
EID:

2-s2.0-77950516100

Contributors: Abu-Nimeh, S.; Miyazaki, S.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Privacy risk assessment in privacy requirements engineering

2009 | Conference paper
DOI:

10.1109/RELAW.2009.10

EID:

2-s2.0-77953009489

Contributors: Abu-Nimeh, S.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Software assurance practice at Ford: A case study

2009 | Journal article
EID:

2-s2.0-65949120405

Contributors: Mead, N.R.; Shoemaker, D.; Ingalsbe, J.A.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Software engineering education: How far we've come and how far we have to go

2009 | Journal article
DOI:

10.1016/j.jss.2008.12.038

EID:

2-s2.0-62849108188

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Teaching security requirements engineering using SQUARE

2009 | Conference paper
DOI:

10.1109/REET.2009.12

EID:

2-s2.0-77953746686

Contributors: Mead, N.R.; Shoemaker, D.; Ingalsbe, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

An immersion program to help students understand the impact of cross cultural differences in software engineering work

2008 | Conference paper
DOI:

10.1109/COMPSAC.2008.82

EID:

2-s2.0-51949119457

Contributors: Mead, N.R.; Shoemaker, D.; Drommi, A.; Ingalsbe, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Computer-aided privacy requirements elicitation technique

2008 | Conference paper
DOI:

10.1109/APSCC.2008.263

EID:

2-s2.0-67049134882

Contributors: Miyazaki, S.; Mead, N.; Zhan, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Incorporating security requirements engineering into standard lifecycle processes

2008 | Journal article
EID:

2-s2.0-84858255138

Contributors: Mead, N.R.; Viswanathan, V.; Zhan, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Incorporating security requirements engineering into the dynamic systems development method

2008 | Conference paper
DOI:

10.1109/COMPSAC.2008.85

EID:

2-s2.0-51949096904

Contributors: Mead, N.R.; Viswanathan, V.; Padmanabhan, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Incorporating security requirements engineering into the rational unified process

2008 | Conference paper
DOI:

10.1109/ISA.2008.19

EID:

2-s2.0-51349146951

Contributors: Mead, N.R.; Viswanathan, V.; Zhan, J.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Integrating secure software assurance content with SE 2004 recommendations

2008 | Conference paper
DOI:

10.1109/CSEET.2008.14

EID:

2-s2.0-51749087497

Contributors: Shoemaker, D.; Drommi, A.; Ingalsbe, J.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Integrating software assurance knowledge into conventional curricula

2008 | Journal article
EID:

2-s2.0-38149088860

Contributors: Mead, N.R.; Shoemaker, D.; Ingalsbe, J.A.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Novel methods of incorporating security requirements engineering into software engineering courses and curricula

2008 | Book
DOI:

10.4018/978-1-60566-102-5.ch006

EID:

2-s2.0-84900569017

Contributors: Mead, N.R.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Software engineering education: How far we've come and how far we have to go

2008 | Conference paper
DOI:

10.1109/CSEET.2008.33

EID:

2-s2.0-51749083293

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Threat modeling the enterprise

2008 | Conference paper
EID:

2-s2.0-84870311744

Contributors: Ingalsbe, J.A.; Shoemaker, D.; Mead, N.R.; Drommi, A.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Threat modeling: Diving into the deep end

2008 | Journal article
DOI:

10.1109/MS.2008.25

EID:

2-s2.0-39449110065

Contributors: Ingalsbe, J.A.; Kunimatsu, L.; Baeten, T.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

A comparison of the software assurance common body of knowledge to common curricular standards

2007 | Conference paper
DOI:

10.1109/CSEET.2007.6

EID:

2-s2.0-34948848644

Contributors: Shoemaker, D.; Drommi, A.; Ingalsbe, J.A.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Maintaining IT's corporate impact through a governance framework

2007 | Journal article
EID:

2-s2.0-34547851821

Contributors: Mead, N.R.; Shoemaker, D.; Drommi, A.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

On the feasibility of specialization within software engineering degree programs

2007 | Conference paper
DOI:

10.1109/CSEET.2007.36

EID:

2-s2.0-34948890053

Contributors: Mead, N.R.; Hilburn, T.B.; McDonald, J.; Ryan, M.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Optimizing investments in security countermeasures

2007 | Journal article
DOI:

10.1109/MSP.2007.117

EID:

2-s2.0-34948845623

Contributors: Caulkins, J.; Hough, E.D.; Mead, N.R.; Osman, H.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Producing alignment-savvy CIOs

2007 | Journal article
EID:

2-s2.0-33947122114

Contributors: Mead, N.R.; Shoemaker, D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Experiences in eliciting security requirements

2006 | Journal article
EID:

2-s2.0-33845342159

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Identifying security requirements using the security quality requirements engineering (SQUARE) method

2006 | Book
DOI:

10.4018/978-1-59904-147-6.ch003

EID:

2-s2.0-84899324292

Contributors: Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Requirements engineering paper classification and evaluation criteria: A proposal and a discussion

2006 | Journal article
DOI:

10.1007/s00766-005-0021-6

EID:

2-s2.0-31044444123

Contributors: Wieringa, R.; Maiden, N.; Mead, N.; Rolland, C.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Security requirements engineering for software systems: Case studies in support of software engineering education

2006 | Conference paper
DOI:

10.1109/CSEET.2006.30

EID:

2-s2.0-33750135439

Contributors: Mead, N.R.; Hough, E.D.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

A portal for software security

2005 | Journal article
DOI:

10.1109/MSP.2005.88

EID:

2-s2.0-24344437348

Contributors: Mead, N.R.; Mcgraw, G.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier

Engineering security into the software development life cycle

2005 | Journal article
EID:

2-s2.0-26044475368

Contributors: McGraw, G.M.; Mead, N.R.
Source: Self-asserted source
Nancy Mead via Scopus - Elsevier
Items per page:
Page 1 of 2