Rights statement: © 2018 The Owner/Authors. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment http://doi.acm.org/10.1145/3194707.3194713
Accepted author manuscript, 1.19 MB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 27/05/2018 |
---|---|
Host publication | SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment |
Place of Publication | New York |
Publisher | ACM |
Pages | 26-32 |
Number of pages | 7 |
ISBN (electronic) | 9781450357272 |
<mark>Original language</mark> | English |
Event | 1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018 - Gothenburg, Sweden Duration: 27/05/2018 → … |
Conference | 1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018 |
---|---|
Country/Territory | Sweden |
City | Gothenburg |
Period | 27/05/18 → … |
Conference | 1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018 |
---|---|
Country/Territory | Sweden |
City | Gothenburg |
Period | 27/05/18 → … |
Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software security this may encourage. This study joins recent calls to understand more about how developers use Internet sources to solve security problems. As a first step, the authors have analyzed a set of questions within the security channel of Stack Overflow. Preliminary findings reveal more about this community of practitioners: who are the askers and commenters, how security questions are asked and how developers frame technical information using social and experience-based perceptions of security.