The study is part of a design research effort: the design of a serious game to raise awareness for secure coding and to increase knowledge of secure coding guidelines among software developers. This repository contains the raw results of the data collected on awareness of vulnerabilities and training levels of industrial software developers from three different companies in the months of August, September and October 2019. This survey contains results on questions on why software developers comply with secure coding guidelines. It also covers questions to understand how well secure software development practices are established in the industry, the factors that influence whether industrial software engineers comply with secure coding guidel...
Eleanor Roosevelt once said: Learn from the mistakes of others. You can’t live long enough to make ...
Background: Recent studies show that secure coding is about not only technical requirements but als...
The pressure on software developers to produce secure software has never been greater. But what does...
Software needs to be secure, in particular when deployed to critical infrastructures. Secure coding ...
The Department of Homeland Security in the United States estimates that 90% of software vulnerabilit...
Abstract: Secure software development practices adoption could be the most influential factor for th...
The advancement of technology has made the development of software applications become unstoppabl...
Secure coding guidelines are essential material used to train and raise awareness of software develo...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
Context: Software security engineering provides the means to define, implement and verify security i...
Awareness of cybersecurity topics facilitates software developers to produce secure code. This aware...
The demand of secure computing systems and its platform is crucial in today's networked and computin...
Security of software systems is of general concern, yet breaches caused by common vulnerabilities st...
More and more businesses and services are depending on software to run their daily operations and bu...
To minimize the possibility of introducing vulnerabilities in source code, software developers may a...
Eleanor Roosevelt once said: Learn from the mistakes of others. You can’t live long enough to make ...
Background: Recent studies show that secure coding is about not only technical requirements but als...
The pressure on software developers to produce secure software has never been greater. But what does...
Software needs to be secure, in particular when deployed to critical infrastructures. Secure coding ...
The Department of Homeland Security in the United States estimates that 90% of software vulnerabilit...
Abstract: Secure software development practices adoption could be the most influential factor for th...
The advancement of technology has made the development of software applications become unstoppabl...
Secure coding guidelines are essential material used to train and raise awareness of software develo...
Vulnerabilities persist despite existing software security initiatives and best practices. This pape...
Context: Software security engineering provides the means to define, implement and verify security i...
Awareness of cybersecurity topics facilitates software developers to produce secure code. This aware...
The demand of secure computing systems and its platform is crucial in today's networked and computin...
Security of software systems is of general concern, yet breaches caused by common vulnerabilities st...
More and more businesses and services are depending on software to run their daily operations and bu...
To minimize the possibility of introducing vulnerabilities in source code, software developers may a...
Eleanor Roosevelt once said: Learn from the mistakes of others. You can’t live long enough to make ...
Background: Recent studies show that secure coding is about not only technical requirements but als...
The pressure on software developers to produce secure software has never been greater. But what does...