Research shows that commonly accepted security requirements are not generally applied in practice. Instead of relying on requirements checklists, security experts rely on their expertise and background knowledge to identify security vulnerabilities. To understand the gap between available checklists and practice, we conducted a series of interviews to encode the decision-making process of security experts and novices during security requirements analysis. Participants were asked to analyze two types of artifacts: source code, and network diagrams for vulnerabilities and to apply a requirements checklist to mitigate some of those vulnerabilities. We framed our study using Situation Awareness-a cognitive theory from psychology-to elicit respo...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Abstract—Recently, there has been an increase of reported security threats hitting organizations. So...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
Providing secure solutions for information systems relies on decisions made by expert security profe...
Context & motivation: More and more software projects today are security-related in one way or the o...
Organizations rely on security experts to improve the security of their systems. These professionals...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This position paper describes work on trust assumptions in the con-text of security requirements. We...
Context: Security considerations are typically incorporated in the later stages of development as an...
In spite of the growing importance of software security and the industry demand for more cyber secur...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Abstract—Recently, there has been an increase of reported security threats hitting organizations. So...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
Providing secure solutions for information systems relies on decisions made by expert security profe...
Context & motivation: More and more software projects today are security-related in one way or the o...
Organizations rely on security experts to improve the security of their systems. These professionals...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
© 2016 IEEE. Organizations rely on security experts to improve the security of their systems. These ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
Recently, there has been an increase of reported security threats hitting organizations. Some of the...
This position paper describes work on trust assumptions in the con-text of security requirements. We...
Context: Security considerations are typically incorporated in the later stages of development as an...
In spite of the growing importance of software security and the industry demand for more cyber secur...
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been rece...
Abstract—Recently, there has been an increase of reported security threats hitting organizations. So...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...