" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products

JM Haney, M Theofanos, Y Acar… - Fourteenth Symposium on …, 2018 - usenix.org
Cryptography is an essential component of modern computing. Unfortunately, implementing
cryptography correctly is a non-trivial undertaking. Past studies have supported this …

Pushed by Accident: A {Mixed-Methods} Study on Strategies of Handling Secret Information in Source Code Repositories

A Krause, JH Klemmer, N Huaman, D Wermke… - 32nd USENIX Security …, 2023 - usenix.org
Version control systems for source code, such as Git, are key tools in modern software
development. Many developers use services like GitHub or GitLab for collaborative software …

Secure Cryptography Usage in Software Development: A Systematic Literature Review

BJ Hernández-Marcial, X Limón… - 2024 12th …, 2024 - ieeexplore.ieee.org
Cryptography plays a significant role in software engineering, its application is paramount
for the security of software systems. However, comprehending and securely utilizing …

[PDF][PDF] CogniCrypt-the secure integration of cryptographic software.

S Krüger - 2020 - bodden.de
Prior research has empirically laid bare the widespread misuse of cryptographic APIs in
software applications. Developers struggle with bad API design and lack of cryptographic …

Practitioners' views on cybersecurity control adoption and effectiveness

L Axon, A Erola, A Janse van Rensburg… - Proceedings of the 16th …, 2021 - dl.acm.org
Cybersecurity practitioners working in organisations implement risk controls aiming to
improve the security of their systems. Determining prioritisation of the deployment of controls …

A case study of mobile health applications: the OWASP risk of insufficient cryptography

S Schmeelk, L Tao - Journal of Computer Science …, 2022 - journals.bilpubgroup.com
Mobile devices are being deployed rapidly for both private and professional reasons. One
area of that has been growing is in releasing healthcare applications into the mobile …

Exploring the security narrative in the work context

K Busse, J Seifert, M Smith - Journal of Cybersecurity, 2020 - academic.oup.com
It is a well-known fact that the language of IT security experts differs from that of non-security-
related people, leading to a multitude of problems. However, very little work has examined …

The perception of security in selected contexts

K Busse - 2021 - bonndoc.ulb.uni-bonn.de
The perception of security has a strong impact on a person's choice of and interaction with
security technology, especially within the context of Usable Security and Privacy research …