Software security patch management-A systematic literature review of challenges, approaches, tools and practices
Context: Software security patch management purports to support the process of patching
known software security vulnerabilities. Patching security vulnerabilities in large and …
known software security vulnerabilities. Patching security vulnerabilities in large and …
Human factors in cybersecurity: a sco** review
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
traditionally the Computer Science (CS) researchers have investigated the technical aspects …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …
Where to recruit for security development studies: Comparing six software developer samples
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …
particular, studying security development challenges such as the usability of security APIs …