Home > Research > Publications & Outputs > Security Responses in Software Development

Associated organisational unit

Electronic data

  • TOSEM-2021-0135.FinalSubmission

    Accepted author manuscript, 3.7 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Security Responses in Software Development

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Security Responses in Software Development. / Lopez, Tamara; Sharp, Helen; Tun, Thein et al.
In: ACM Transactions on Software Engineering and Methodology, Vol. 32, No. 3, 64, 31.07.2023, p. 1-29.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Lopez, T, Sharp, H, Tun, T, Bandara, A, Levine, M & Nuseibeh, B 2023, 'Security Responses in Software Development', ACM Transactions on Software Engineering and Methodology, vol. 32, no. 3, 64, pp. 1-29. https://doi.org/10.1145/3563211

APA

Lopez, T., Sharp, H., Tun, T., Bandara, A., Levine, M., & Nuseibeh, B. (2023). Security Responses in Software Development. ACM Transactions on Software Engineering and Methodology, 32(3), 1-29. Article 64. https://doi.org/10.1145/3563211

Vancouver

Lopez T, Sharp H, Tun T, Bandara A, Levine M, Nuseibeh B. Security Responses in Software Development. ACM Transactions on Software Engineering and Methodology. 2023 Jul 31;32(3):1-29. 64. Epub 2022 Sept 12. doi: 10.1145/3563211

Author

Lopez, Tamara ; Sharp, Helen ; Tun, Thein et al. / Security Responses in Software Development. In: ACM Transactions on Software Engineering and Methodology. 2023 ; Vol. 32, No. 3. pp. 1-29.

Bibtex

@article{f4cfb853803a4d8fba7d2df633dcacae,
title = "Security Responses in Software Development",
abstract = "The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development. Using theory drawn from information security and motivation research in software engineering, this article characterizes key ways in which individual developers form security responses to meet the demands of particular circumstances, providing a framework managers and teams can use to recognize, understand, and alter security activity in their environments.",
keywords = "Software engineering, Security, Developers",
author = "Tamara Lopez and Helen Sharp and Thein Tun and Arosha Bandara and Mark Levine and Bashar Nuseibeh",
year = "2023",
month = jul,
day = "31",
doi = "10.1145/3563211",
language = "English",
volume = "32",
pages = "1--29",
journal = "ACM Transactions on Software Engineering and Methodology",
issn = "1049-331X",
publisher = "Association for Computing Machinery (ACM)",
number = "3",

}

RIS

TY - JOUR

T1 - Security Responses in Software Development

AU - Lopez, Tamara

AU - Sharp, Helen

AU - Tun, Thein

AU - Bandara, Arosha

AU - Levine, Mark

AU - Nuseibeh, Bashar

PY - 2023/7/31

Y1 - 2023/7/31

N2 - The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development. Using theory drawn from information security and motivation research in software engineering, this article characterizes key ways in which individual developers form security responses to meet the demands of particular circumstances, providing a framework managers and teams can use to recognize, understand, and alter security activity in their environments.

AB - The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development. Using theory drawn from information security and motivation research in software engineering, this article characterizes key ways in which individual developers form security responses to meet the demands of particular circumstances, providing a framework managers and teams can use to recognize, understand, and alter security activity in their environments.

KW - Software engineering

KW - Security

KW - Developers

U2 - 10.1145/3563211

DO - 10.1145/3563211

M3 - Journal article

VL - 32

SP - 1

EP - 29

JO - ACM Transactions on Software Engineering and Methodology

JF - ACM Transactions on Software Engineering and Methodology

SN - 1049-331X

IS - 3

M1 - 64

ER -