Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290605.3300519
|View full text |Cite
|
Sign up to set email alerts
|

'Think secure from the beginning'

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(25 citation statements)
references
References 39 publications
0
25
0
Order By: Relevance
“…However, they do not address the issue of the development of systems that meet privacy and security requirements [53]. Additionally, Assal and Chiasson [54] indicated that security guidelines do not exist or are not mandated by the companies or that developers might lack the ability or proper expertise to identify vulnerabilities despite having general security knowledge. Our reviewed studies, including S3 [12], S4 [32], S12 [9], and S20 [39], have pointed out a general lack of security guidelines for developing secure mHealth apps.…”
Section: C1: Lack Of Security Guidelines and Regulations For Developing Secure Mhealth Appsmentioning
confidence: 99%
“…However, they do not address the issue of the development of systems that meet privacy and security requirements [53]. Additionally, Assal and Chiasson [54] indicated that security guidelines do not exist or are not mandated by the companies or that developers might lack the ability or proper expertise to identify vulnerabilities despite having general security knowledge. Our reviewed studies, including S3 [12], S4 [32], S12 [9], and S20 [39], have pointed out a general lack of security guidelines for developing secure mHealth apps.…”
Section: C1: Lack Of Security Guidelines and Regulations For Developing Secure Mhealth Appsmentioning
confidence: 99%
“…It has also been observed that several factors including dependability, trustworthiness, and human trust have been ignored which also play a key role for longer security during the software development process. Further, security-and durability-related literature are discussed as follows: In 2019, H. Assal and S. Chiasson have presented a survey report and discussed the security strategies for prediction of life span for security services [24]. Development companies are trying to develop secure and durable services as per the users' needs and market values.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Additionally, the company's culture, resource availability and security-incidents directly impact the adoption of security practices. In another study, Assal et al [9], explored how developers influence and get influenced by organizational processes. They found that the organization process needs better structure to support the developers.…”
Section: Secure Software Developmentmentioning
confidence: 99%