Home > Research > Publications & Outputs > An investigation of security conversations in s...

Electronic data

  • An investtigation of security conversations

    Rights statement: © 2018 The Owner/Authors. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment http://doi.acm.org/10.1145/3194707.3194713

    Accepted author manuscript, 1.19 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

An investigation of security conversations in stack overflow: Perceptions of security and community involvement

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
  • Tamara Lopez
  • Thein T. Tun
  • Arosha Bandara
  • Mark Levine
  • Bashar Nuseibeh
  • Helen Sharp
Close
Publication date27/05/2018
Host publicationSEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment
Place of PublicationNew York
PublisherACM
Pages26-32
Number of pages7
ISBN (electronic)9781450357272
<mark>Original language</mark>English
Event1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018 - Gothenburg, Sweden
Duration: 27/05/2018 → …

Conference

Conference1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018
Country/TerritorySweden
CityGothenburg
Period27/05/18 → …

Conference

Conference1st ACM/IEEE International Workshop on Security Awareness from Design to Deployment, SEAD 2018, co-located with the 40th International Conference on Software Engineering, ICSE 2018
Country/TerritorySweden
CityGothenburg
Period27/05/18 → …

Abstract

Developers turn to Stack Overflow and other on-line sources to find solutions to security problems, but little is known about how they engage with and guide one another in these environments or the perceptions of software security this may encourage. This study joins recent calls to understand more about how developers use Internet sources to solve security problems. As a first step, the authors have analyzed a set of questions within the security channel of Stack Overflow. Preliminary findings reveal more about this community of practitioners: who are the askers and commenters, how security questions are asked and how developers frame technical information using social and experience-based perceptions of security.

Bibliographic note

© 2018 The Owner/Authors. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SEAD '18 Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment http://doi.acm.org/10.1145/3194707.3194713