2018
DOI: 10.1109/ms.2018.290110854
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Security Vulnerability Prevention, Detection, and Response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 2 publications
0
13
0
Order By: Relevance
“…Promotion suggests a strategy of exploration and seizing of opportunities whereas prevention is essentially vigilance-focused and cautionary. Because the usual cybersecurity messages focus on prevention (Ayala, 2016;Holland and Shey, 2015;Williams et al, 2018), messages prompting negative affect, as Sunstein (2003) advises, might not be the best way of discouraging risky behaviours and promoting precautionary behaviour in the cybersecurity context.…”
Section: Results In Relation To Existing Models Of Human Behaviourmentioning
confidence: 99%
“…Promotion suggests a strategy of exploration and seizing of opportunities whereas prevention is essentially vigilance-focused and cautionary. Because the usual cybersecurity messages focus on prevention (Ayala, 2016;Holland and Shey, 2015;Williams et al, 2018), messages prompting negative affect, as Sunstein (2003) advises, might not be the best way of discouraging risky behaviours and promoting precautionary behaviour in the cybersecurity context.…”
Section: Results In Relation To Existing Models Of Human Behaviourmentioning
confidence: 99%
“…1. Studies by Howard and Leblanc (2001), Ponta et al (2018), Nguyen et al (2016), Munaiah et al (2017), Hejderup (2015), Pashchenko et al (2018), and Williams et al (2018) encourage developers to use security best practices, e.g., project validation, security monitoring, to prevent and detect vulnerabilities in deployed projects. 2.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, the frameworks [19] and [22] converge on the activities related to policies and securitization of the development environment. Few studies analyze in depth the methodologies of secureby-default development [24], [25]. Grégoire et al [26] compare the similarities of Microsoft SDL [17] and CLASP-OWASP [20] in a theoretical way.…”
Section: Background and Related Workmentioning
confidence: 99%