Engaging Company Developers in Security Research Studies: A Comprehensive Literature Review and Quantitative Survey
Previous research demonstrated that company developers excel compared to freelancers
and computer science students, with the corporate environment significantly influencing …
and computer science students, with the corporate environment significantly influencing …
On the recruitment of company developers for security studies: results from a qualitative interview study
To address the issue of participant recruitment for security developer studies, researchers
proposed using freelance online platforms or recruiting computer science (CS) students as …
proposed using freelance online platforms or recruiting computer science (CS) students as …
[HTML][HTML] Addressing combinatorial experiments and scarcity of subjects by provably orthogonal and crossover experimental designs
Abstract Context: Experimentation in Software and Security Engineering is a common
research practice, in particular with human subjects. Problem: The combinatorial nature of …
research practice, in particular with human subjects. Problem: The combinatorial nature of …
Pushed by Accident: A {Mixed-Methods} Study on Strategies of Handling Secret Information in Source Code Repositories
Version control systems for source code, such as Git, are key tools in modern software
development. Many developers use services like GitHub or GitLab for collaborative software …
development. Many developers use services like GitHub or GitLab for collaborative software …
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies
When studying how software developers perform security tasks, researchers often ask
participants to write code. These studies can be challenging because programming can be …
participants to write code. These studies can be challenging because programming can be …
Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?
Software security is an area of growing concern, with over 192,000 known vulnerabilities in
public software at the time of writing. Many aids to secure coding exist. Assessing the …
public software at the time of writing. Many aids to secure coding exist. Assessing the …