4.7 Review

A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Information Systems

Developers Are Neither Enemies Nor Users: They Are Collaborators

Partha Das Chowdhury et al.

Summary: Research has identified misconceptions and patterns about developers in the realm of secure programming, which hinder the effectiveness of interventions. Collaboration between developers, security experts, and API designers is suggested to enhance system security.

2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021) (2021)

Article Computer Science, Information Systems

Privacy by Evidence: A Methodology to develop privacy-friendly software applications

Pedro Barbosa et al.

INFORMATION SCIENCES (2020)

Article Physics, Multidisciplinary

Perceptions of ICT Practitioners Regarding Software Privacy

Edna Dias Canedo et al.

ENTROPY (2020)

Article Computer Science, Software Engineering

A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach

Valentina Casola et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2020)

Review Computer Science, Information Systems

Security and Privacy of mHealth Applications: A Scoping Review

Leysan Nurgalieva et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers

Sarah Spiekermann et al.

PROCEEDINGS OF THE IEEE (2019)

Article Green & Sustainable Science & Technology

Responsible for Responsibility? A Study of Digital E-health Startups

Elin Merethe Oftedal et al.

SUSTAINABILITY (2019)

Article Computer Science, Software Engineering

Correlation of critical success factors with success of software projects: an empirical investigation

Vahid Garousi et al.

SOFTWARE QUALITY JOURNAL (2019)

Article Computer Science, Theory & Methods

A Survey on Various Threats and Current State of Security in Android Platform

Parnika Bhat et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Theory & Methods

Mitigating Phishing Attacks: An Overview

Alex Sumner et al.

PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

An Architectural View for Data Protection by Design

Laurens Sion et al.

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA) (2019)

Proceedings Paper Computer Science, Cybernetics

If you want, I can store the encrypted password. A Password-Storage Field Study with Freelance Developers

Alena Naiakshina et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Proceedings Paper Computer Science, Theory & Methods

A Survey on Developer-Centred Security

Mohammad Tahaei et al.

2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2019)

Proceedings Paper Computer Science, Cybernetics

Motivating Cybersecurity Advocates: Implications for Recruitment and Retention

Julie M. Haney et al.

PROCEEDINGS OF THE 2019 COMPUTERS AND PEOPLE RESEARCH CONFERENCE (SIGMIS-CPR '19) (2019)

Article Communication

Engineering Privacy by Design: Are engineers ready to live up to the challenge?

Kathrin Bednar et al.

INFORMATION SOCIETY (2019)

Article Communication

Translating privacy: developer cultures in the global world of practice

Rivka Ribak

INFORMATION COMMUNICATION & SOCIETY (2019)

Proceedings Paper Computer Science, Cybernetics

Think secure from the beginning: A Survey with Software Developers

Hala Assal et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Proceedings Paper Computer Science, Theory & Methods

A System of Privacy Patterns for Informing Users: Creating a Pattern System

Michael Colesky et al.

EUROPLOP 2018: PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (2018)

Article Computer Science, Software Engineering

Privacy by designers: software developers' privacy mindset

Irit Hadar et al.

EMPIRICAL SOFTWARE ENGINEERING (2018)

Article Psychology, Clinical

As We Grow, It Will Become a Priority*: American Mobile Start-Ups' Privacy Practices

Wenhong Chen et al.

AMERICAN BEHAVIORAL SCIENTIST (2018)

Proceedings Paper Computer Science, Theory & Methods

Developers Need Support, Too: A Survey of Security Advice for Software Developers

Yasemin Acar et al.

2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV) (2017)

Proceedings Paper Computer Science, Information Systems

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

Felix Fischer et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Information Systems

How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate

Oshrat Ayalon et al.

CSCW'17: COMPANION OF THE 2017 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (2017)

Proceedings Paper Computer Science, Theory & Methods

You Get Where You're Looking For The Impact of Information Sources on Code Security

Yasemin Acar et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Review Computer Science, Information Systems

Synthesizing information systems knowledge: A typology of literature reviews

Guy Pare et al.

INFORMATION & MANAGEMENT (2015)

Proceedings Paper Computer Science, Software Engineering

Quantifying Developers' Adoption of Security Tools

Jim Witschey et al.

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS (2015)

Proceedings Paper Engineering, Electrical & Electronic

PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology

Nicolas Notario et al.

2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)

Article Computer Science, Information Systems

Improving App Privacy: Nudging App Developers to Protect User Privacy

Rebecca Balebako et al.

IEEE SECURITY & PRIVACY (2014)

Article Computer Science, Information Systems

A Shortage of Privacy Engineers

Lorrie Faith Cranor et al.

IEEE SECURITY & PRIVACY (2013)

Editorial Material Computer Science, Hardware & Architecture

The Challenges of Privacy by Design

Sarah Spiekermann

COMMUNICATIONS OF THE ACM (2012)

Article Computer Science, Information Systems

A methodology for integrating access control policies within database development

Jenny Abramov et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Theory & Methods

Factors that Affect Software Systems Development Project Outcomes: A Survey of Research

Laurie McLeod et al.

ACM COMPUTING SURVEYS (2011)

Article Health Care Sciences & Services

The behaviour change wheel: A new method for characterising and designing behaviour change interventions

Susan Michie et al.

IMPLEMENTATION SCIENCE (2011)

Article Education, Scientific Disciplines

Characteristics of leadership that influence clinical learning: A narrative review

Rachel Walker et al.

NURSE EDUCATION TODAY (2011)

Editorial Material Computer Science, Hardware & Architecture

Are Companies Actually Using Secure Development Life Cycles?

David Geer

COMPUTER (2010)

Editorial Material Computer Science, Information Systems

Integrating Application Security into Software Development

Jeffery Payne

IT PROFESSIONAL (2010)

Review Psychology, Applied

Bad Apples, Bad Cases, and Bad Barrels: Meta-Analytic Evidence About Sources of Unethical Decisions at Work

Jennifer J. Kish-Gephart et al.

JOURNAL OF APPLIED PSYCHOLOGY (2010)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

Secure Software Engineering: Learning from the Past to Address Future Challenges

Daniel Hein et al.

INFORMATION SECURITY JOURNAL (2009)

Article Rehabilitation

WRITING NARRATIVE LITERATURE REVIEWS FOR PEER-REVIEWED JOURNALS: SECRETS OF THE TRADE

Bart N. Green et al.

JOURNAL OF CHIROPRACTIC MEDICINE (2006)

Article Computer Science, Information Systems

Software security

G McGraw

IEEE SECURITY & PRIVACY (2004)

Article Education & Educational Research

The relevance of systematic reviews to educational policy and practice

P Davies

OXFORD REVIEW OF EDUCATION (2000)