2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.477
|View full text |Cite
|
Sign up to set email alerts
|

Secure Software Engineering: A New Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…To the best of our knowledge, there are few studies that focus explicitly on the application of such theories in teaching of software security. For example, Laschi and Riccioni (2008) and Pullen (2001) applied a constructivist approach to design their virtual labs, while Conklin and Dietrich (2007) considered elements of behaviourism. However, since much more works are available on teaching and learning theories in computer programming, it seems reasonable to consider their findings and observations also in the software security context.…”
Section: Teaching and Learning Theoriesmentioning
confidence: 99%
See 3 more Smart Citations
“…To the best of our knowledge, there are few studies that focus explicitly on the application of such theories in teaching of software security. For example, Laschi and Riccioni (2008) and Pullen (2001) applied a constructivist approach to design their virtual labs, while Conklin and Dietrich (2007) considered elements of behaviourism. However, since much more works are available on teaching and learning theories in computer programming, it seems reasonable to consider their findings and observations also in the software security context.…”
Section: Teaching and Learning Theoriesmentioning
confidence: 99%
“…In fact, practitioners who use abstractions usually have a fairly good knowledge of the underlying model. Conklin and Dietrich (2007) propose a paradigm to secure software engineering, which includes also elements of behaviourist theories. They underline that the knowledge of primitives and building blocks is essential and that these core concepts must be taught along with the system concepts.…”
Section: Thementioning
confidence: 99%
See 2 more Smart Citations
“…Even though these attacks are on the rise, IoT continues to enjoy an even greater surge in popularity and adoption [1] where there is thought to be more than 30 million connected devices worldwide [2]. A substantial number of the attacks stem from poorly built integrated systems and software, where security is not considered during the requirements analysis, design, implementation or testing of the product [3,4]. The vulnerabilities in IoT devices which include outdated software/firmware, default usernames and passwords, and the inability to run software updates or change usernames and passwords [1], are leveraged to gain initial access to networks of corporate targets which then can be further exploited [5].…”
Section: Introductionmentioning
confidence: 99%