Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development

L Nurgalieva, A Frik, G Doherty - ACM Computing Surveys, 2023 - dl.acm.org
Privacy and security are complex topics, raising a variety of considerations and
requirements that can be challenging to implement in software development. Determining …

Exploring gender dynamics in cybersecurity education: a self-determination theory and social cognitive theory perspective

SP Francis, VK Kolil, V Pavithran, I Ray… - Computers & Security, 2024 - Elsevier
The cybersecurity industry is facing two major challenges as cyber threats get more serious:
a shortage of skilled workers to defend against these attacks and a noticeable …

An Ethnographic Understanding of Software ({In) Security} and a {Co-Creation} Model to Improve Secure Software Development

H Palombo, AZ Tabari, D Lende, J Ligatti… - Sixteenth Symposium on …, 2020 - usenix.org
We present an ethnographic study of secure software development processes in a software
company using the anthropological research method of participant observation. Two PhD …

Training and Embedding Cybersecurity Guardians in Older Communities.

J Nicholson, B Morrison, M Dixon, J Holt… - Proceedings of the …, 2021 - dl.acm.org
Older adults can struggle to access relevant community expertise when faced with new
situations. One such situation is the number of cyberattacks they may face when interacting …

An analysis of the role of situated learning in starting a security culture in a software company

A Tuladhar, D Lende, J Ligatti, X Ou - Seventeenth Symposium on …, 2021 - usenix.org
We conducted an ethnographic study of a software development company to explore if and
how a development team adopts security practices into the development lifecycle. A PhD …

Barriers to online dementia information and mitigation

E Dixon, J Anderson, D Blackwelder… - Proceedings of the …, 2022 - dl.acm.org
There is growing interest in HCI to study ways to support access to accurate, accessible,
relevant online health information for different populations. Yet, there remains a need to …

" We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups

D Keküllüoğlu, Y Acar - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Security and privacy are often neglected in software development, and rarely a priority for
developers. This insight is commonly based on research conducted by researchers and on …

Cybersecurity advocates: discovering the characteristics and skills of an emergent role

JM Haney, WG Lutters - Information & Computer Security, 2021 - emerald.com
Cybersecurity advocates: discovering the characteristics and skills of an emergent role |
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with us …

Understanding how to diversify the cybersecurity workforce: A qualitative analysis

M Namukasa, C Ficke… - Journal of …, 2023 - digitalcommons.kennesaw.edu
A robust cybersecurity workforce is critical for protection against a range of malicious attacks.
However, it has been noted that there are many vacancies and a shortage of individuals …