Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate developers in writing secure code. In order to widen our understanding of developers’ behaviour, we considered the complexity of the security decision space of developers using theory from cognitive and social psychology. Our interdisciplinary study reported in this paper (1) draws on the psychology literature to provide conceptual underpinnings for three categories of impediments to achieving security goals, (2) reports on an in-depth meta-analysis of existing software security literature which identi...
Security of software systems is of general concern, yet breaches caused by common vulnerabilities st...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
Background: Recent studies show that secure coding is about not only technical requirements but also...
Background: Recent studies show that secure coding is about not only technical requirements but also...
Background: Recent studies show that secure coding is about not only technical requirements but als...
The pressure on software developers to produce secure software has never been greater. But what does...
The pressure on software developers to produce secure software has never been greater. But what does...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
When writing software code, developers typically prioritise functionality over security, either cons...
peer-reviewedSecurity of software systems is of general concern, yet breaches caused by common vuln...
While the techniques to achieve secure, privacypreserving software are now well understood, evidence...
Developing secure software is still an important issue in the computing world. Big software firms sp...
Security of software systems is of general concern, yet breaches caused by common vulnerabilities st...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
Despite the availability of various methods and tools to facilitate secure coding, developers contin...
Background: Recent studies show that secure coding is about not only technical requirements but also...
Background: Recent studies show that secure coding is about not only technical requirements but also...
Background: Recent studies show that secure coding is about not only technical requirements but als...
The pressure on software developers to produce secure software has never been greater. But what does...
The pressure on software developers to produce secure software has never been greater. But what does...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
When writing software code, developers typically prioritise functionality over security, either cons...
peer-reviewedSecurity of software systems is of general concern, yet breaches caused by common vuln...
While the techniques to achieve secure, privacypreserving software are now well understood, evidence...
Developing secure software is still an important issue in the computing world. Big software firms sp...
Security of software systems is of general concern, yet breaches caused by common vulnerabilities st...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...
Reviewing source code from a security perspective has proven to be a difficult task. Indeed, previou...