Software security in practice: knowledge and motivation

被引:0
|
作者
Assal, Hala [1 ]
Morkonda, Srivathsan G. [2 ]
Arif, Muhammad Zaid [2 ]
Chiasson, Sonia [2 ]
机构
[1] Dept Syst & Comp Engn, 1125 Colonel By Dr, Ottawa, ON K1S 5B6, Canada
[2] Carleton Univ, Sch Comp Sci, 1125 Colonel Dr, Ottawa, ON K1S 5B6, Canada
来源
JOURNAL OF CYBERSECURITY | 2025年 / 11卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
usable security; software security; software developers; interview; security knowledge; security motivation; SELF-DETERMINATION THEORY; INTRINSIC MOTIVATION; WORK;
D O I
10.1093/cybsec/tyaf005
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Developing secure software remains a challenge for developers despite the availability of security resources and secure development tools. Common factors affecting software security include the developer's security awareness and the rationales behind their development decisions with respect to security. In this work, we conducted interviews with software developers to examine how developers in organizations acquire security knowledge, and what factors motivate or prevent developers from adopting software security practices. Our analysis reveals that developers' security knowledge and motivations are intertwined aspects that are both important for promoting security in development teams. We identified a variety of learning opportunities used by developers and employers for increasing security awareness, including in-context learning activities preferred by developers. Based on our application of the self-determination theory, better security outcomes are expected when developers are internally driven toward security, rather than motivated by external factors; this aligns with our interpretation of participants' descriptions relating to security outcomes within their teams. Based on our analysis, we provide ideas on how to motivate developers to internalize security and improve their security practices.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Motivation in Software Architecture and Software Project Management
    Gardazi, Syeda Uzma
    Gardazi, Syeda Faiza
    Khan, Haroon
    Shahid, Arshad Ali
    ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, : 403 - 409
  • [32] SOFTWARE SECURITY
    PALME, J
    DATAMATION, 1974, 20 (01): : 51 - 55
  • [33] SOFTWARE SECURITY
    WALSH, S
    DATA PROCESSING, 1983, 25 (03): : 9 - 10
  • [34] A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
    Azzazi, Ahmad
    Shkoukani, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 395 - 400
  • [35] An Ontology-Based Context Model for Managing Security Knowledge in Software Development
    Wen, Shao-Fang
    Katt, Basel
    PROCEEDINGS OF THE 2018 23RD CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2018, : 416 - 424
  • [36] Software security
    McGraw, G
    IEEE SECURITY & PRIVACY, 2004, 2 (02) : 80 - 83
  • [37] SOFTWARE SECURITY
    WALSH, ME
    JOURNAL OF SYSTEMS MANAGEMENT, 1981, 32 (10): : 6 - 13
  • [38] Software Security
    Sametinger, Johannes
    2013 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2013), 2013, : 216 - 216
  • [39] Constructing a Knowledge Base for Software Security Detection Based on Similar Call Graph
    Xue, Jingfeng
    Hu, Changzhen
    Wang, Kunsheng
    Ma, Rui
    Leng, Bingxin
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 593 - +
  • [40] Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach
    Xiao, Hongbo
    Xing, Zhenchang
    Li, Xiaohong
    Guo, Hao
    NEURAL INFORMATION PROCESSING (ICONIP 2019), PT III, 2019, 11955 : 50 - 63