Everyone for themselves? a qualitative study about individual security setups of open source software contributors

S Amft, S Höltervennhoff, R Panskus… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
To increase open-source software supply chain security, protecting the development
environment of contributors against attacks is crucial. For example, contributors must protect …

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

JH Klemmer, SA Horstmann, N Patnaik… - Proceedings of the …, 2024 - dl.acm.org
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub
Copilot, the software industry quickly utilized these tools for software development tasks, eg …

Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises

J Hielscher, M Schöps, J Opdenbusch… - Proceedings of the …, 2024 - dl.acm.org
Security awareness and training (SAT) vendors operate in a growing multi-billion dollar
market. They publish various marketing promises on their websites to their customers …

Simple But Not Secure: An Empirical Security Analysis of Two-factor Authentication Systems

Z Wang, X Yang, D Chen, H Gao, M Tian, Y Jia… - arXiv preprint arXiv …, 2024 - arxiv.org
To protect users from data breaches and phishing attacks, service providers typically
implement two-factor authentication (2FA) to add an extra layer of security against …

What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers

A Kruzikova, J Suchanek, M Broz, M Ukrop… - Proceedings of the 19th …, 2024 - dl.acm.org
Several security issues in open-source projects demonstrate that developer accounts get
misused or stolen if weak authentication is used. Many services have started to enforce …

[PDF][PDF] Human Factors in Open Source Security

M Fourné - 2024 - marcelfourne.de
Software security research has begun to formalize attacks and defenses against commonly
deployed software, even the most optimized cryptography [38]. Newer programming …

Human-centred security leadership in organizations

J Hielscher - 2024 - hss-opus.ub.ruhr-uni-bochum.de
RUB-Repository - Human-centred security leadership in organizations Deutsch OPUS UB
Bochum RUB » Bibliotheksportal Home Search Browse Publish FAQ OPUS UB Bochum …

Developers' Approaches to Software Supply Chain Security: An Interview Study

R Sammak, AL Rotthaler, HS Ramulu… - Proceedings of the …, 2023 - dl.acm.org
Software Supply Chain Security (SSC) involves numerous stakeholders, processes and
tools that work together to deliver a software product. A vulnerability in one element can …

On the usability of authentication security communication

SM Amft - 2024 - repo.uni-hannover.de
Information technology has become more and more ubiquitous in recent times, and it affects
almost all aspects of modern life. To protect this technology and its underlying resources, the …