Related references
Note: Only part of the references are listed.Developers Are Neither Enemies Nor Users: They Are Collaborators
Partha Das Chowdhury et al.
2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021) (2021)
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
Pedro Barbosa et al.
INFORMATION SCIENCES (2020)
Perceptions of ICT Practitioners Regarding Software Privacy
Edna Dias Canedo et al.
ENTROPY (2020)
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Valentina Casola et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2020)
Security and Privacy of mHealth Applications: A Scoping Review
Leysan Nurgalieva et al.
IEEE ACCESS (2020)
Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers
Sarah Spiekermann et al.
PROCEEDINGS OF THE IEEE (2019)
Responsible for Responsibility? A Study of Digital E-health Startups
Elin Merethe Oftedal et al.
SUSTAINABILITY (2019)
Correlation of critical success factors with success of software projects: an empirical investigation
Vahid Garousi et al.
SOFTWARE QUALITY JOURNAL (2019)
A Survey on Various Threats and Current State of Security in Android Platform
Parnika Bhat et al.
ACM COMPUTING SURVEYS (2019)
Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development
Katie Shilton et al.
JOURNAL OF BUSINESS ETHICS (2019)
Mitigating Phishing Attacks: An Overview
Alex Sumner et al.
PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019) (2019)
An Architectural View for Data Protection by Design
Laurens Sion et al.
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA) (2019)
If you want, I can store the encrypted password. A Password-Storage Field Study with Freelance Developers
Alena Naiakshina et al.
CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)
A Survey on Developer-Centred Security
Mohammad Tahaei et al.
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2019)
Motivating Cybersecurity Advocates: Implications for Recruitment and Retention
Julie M. Haney et al.
PROCEEDINGS OF THE 2019 COMPUTERS AND PEOPLE RESEARCH CONFERENCE (SIGMIS-CPR '19) (2019)
Engineering Privacy by Design: Are engineers ready to live up to the challenge?
Kathrin Bednar et al.
INFORMATION SOCIETY (2019)
Translating privacy: developer cultures in the global world of practice
Rivka Ribak
INFORMATION COMMUNICATION & SOCIETY (2019)
Think secure from the beginning: A Survey with Software Developers
Hala Assal et al.
CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)
A System of Privacy Patterns for Informing Users: Creating a Pattern System
Michael Colesky et al.
EUROPLOP 2018: PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (2018)
Privacy by designers: software developers' privacy mindset
Irit Hadar et al.
EMPIRICAL SOFTWARE ENGINEERING (2018)
Platform privacies: Governance, collaboration, and the different meanings of privacy in iOS and Android development
Daniel Greene et al.
NEW MEDIA & SOCIETY (2018)
As We Grow, It Will Become a Priority*: American Mobile Start-Ups' Privacy Practices
Wenhong Chen et al.
AMERICAN BEHAVIORAL SCIENTIST (2018)
Developers Need Support, Too: A Survey of Security Advice for Software Developers
Yasemin Acar et al.
2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV) (2017)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
Felix Fischer et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate
Oshrat Ayalon et al.
CSCW'17: COMPANION OF THE 2017 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (2017)
You Get Where You're Looking For The Impact of Information Sources on Code Security
Yasemin Acar et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)
Synthesizing information systems knowledge: A typology of literature reviews
Guy Pare et al.
INFORMATION & MANAGEMENT (2015)
Quantifying Developers' Adoption of Security Tools
Jim Witschey et al.
2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS (2015)
PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology
Nicolas Notario et al.
2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)
Improving App Privacy: Nudging App Developers to Protect User Privacy
Rebecca Balebako et al.
IEEE SECURITY & PRIVACY (2014)
A Shortage of Privacy Engineers
Lorrie Faith Cranor et al.
IEEE SECURITY & PRIVACY (2013)
The Challenges of Privacy by Design
Sarah Spiekermann
COMMUNICATIONS OF THE ACM (2012)
A methodology for integrating access control policies within database development
Jenny Abramov et al.
COMPUTERS & SECURITY (2012)
Factors that Affect Software Systems Development Project Outcomes: A Survey of Research
Laurie McLeod et al.
ACM COMPUTING SURVEYS (2011)
The behaviour change wheel: A new method for characterising and designing behaviour change interventions
Susan Michie et al.
IMPLEMENTATION SCIENCE (2011)
Characteristics of leadership that influence clinical learning: A narrative review
Rachel Walker et al.
NURSE EDUCATION TODAY (2011)
Are Companies Actually Using Secure Development Life Cycles?
David Geer
COMPUTER (2010)
Integrating Application Security into Software Development
Jeffery Payne
IT PROFESSIONAL (2010)
Bad Apples, Bad Cases, and Bad Barrels: Meta-Analytic Evidence About Sources of Unethical Decisions at Work
Jennifer J. Kish-Gephart et al.
JOURNAL OF APPLIED PSYCHOLOGY (2010)
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath et al.
DECISION SUPPORT SYSTEMS (2009)
Secure Software Engineering: Learning from the Past to Address Future Challenges
Daniel Hein et al.
INFORMATION SECURITY JOURNAL (2009)
WRITING NARRATIVE LITERATURE REVIEWS FOR PEER-REVIEWED JOURNALS: SECRETS OF THE TRADE
Bart N. Green et al.
JOURNAL OF CHIROPRACTIC MEDICINE (2006)
Software security
G McGraw
IEEE SECURITY & PRIVACY (2004)
The moral intensity of privacy: an empirical study of webmasters' attitudes
TR Shaw
JOURNAL OF BUSINESS ETHICS (2003)
The relevance of systematic reviews to educational policy and practice
P Davies
OXFORD REVIEW OF EDUCATION (2000)