Challenges and solutions when adopting DevSecOps: A systematic review

RN Rajapakse, M Zahedi, MA Babar, H Shen - Information and software …, 2022 - Elsevier
Abstract Context: DevOps (Development and Operations) has become one of the fastest-
growing software development paradigms in the industry. However, this trend has presented …

Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications

M Tahaei, R Abu-Salma, A Rashid - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …

Understanding privacy-related questions on stack overflow

M Tahaei, K Vaniea, N Saphra - … of the 2020 CHI conference on human …, 2020 - dl.acm.org
We analyse Stack Overflow (SO) to understand challenges and confusions developers face
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …

Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list

M Tahaei, K Vaniea - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …

Deciding on personalized ads: Nudging developers about user privacy

M Tahaei, A Frik, K Vaniea - … Symposium on Usable Privacy and Security …, 2021 - usenix.org
Mobile advertising networks present personalized advertisements to developers as a way to
increase revenue. These types of ads use data about users to select potentially more …

Understanding privacy-related advice on stack overflow

M Tahaei, T Li, K Vaniea - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
Privacy tasks can be challenging for developers, resulting in privacy frameworks and
guidelines from the research community which are designed to assist developers in …

Human factors in cybersecurity: a scoping review

T Rahman, R Rohan, D Pal… - Proceedings of the 12th …, 2021 - dl.acm.org
Humans are often considered to be the weakest link in the cybersecurity chain. However,
traditionally the Computer Science (CS) researchers have investigated the technical aspects …

Security responses in software development

T Lopez, H Sharp, A Bandara, T Tun, M Levine… - ACM Transactions on …, 2023 - dl.acm.org
The pressure on software developers to produce secure software has never been greater.
But what does security look like in environments that do not produce security-critical …