2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2015
DOI: 10.1109/icse.2015.296
|View full text |Cite
|
Sign up to set email alerts
|

A Security Practices Evaluation Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…Other research teams studied historical data. Morrison [29] defined the Security Practices Evaluation Framework (SP-EF), a measurement framework for software development security activities, and evaluated the framework on historical data and industrial/opensource projects [30]. Kwon and Johnson [21] conducted an empirical analysis of data from 2,386 healthcare organizations to identify how different types of security investment affect subsequent security failures.…”
Section: Software Security Practice Studiesmentioning
confidence: 99%
“…Other research teams studied historical data. Morrison [29] defined the Security Practices Evaluation Framework (SP-EF), a measurement framework for software development security activities, and evaluated the framework on historical data and industrial/opensource projects [30]. Kwon and Johnson [21] conducted an empirical analysis of data from 2,386 healthcare organizations to identify how different types of security investment affect subsequent security failures.…”
Section: Software Security Practice Studiesmentioning
confidence: 99%
“…Previous research [108,133,166] emphasized the importance of devising methods to help developers and development companies choose the set of best practices they would follow and help them establish the security process within their organizations.…”
Section: Security Development Lifecycle (Sdl)mentioning
confidence: 99%
“…Available resources for security best practices vary in their organization and their presentation style, e.g., they vary in technical details. Practitioners may find difficulty deciding on best practices to follow and establishing processes within their organizations [108,133,166]. To help frame security practices we identified, we collected recommendations from the sources discussed in Section 2.2 to compose a concise set of best practices.…”
Section: Software Security Best Practicesmentioning
confidence: 99%