Factors Affecting Secure Software Development Practices Among Developers - An Investigation

被引:0
作者
Maher, Zulfikar Ahmed [1 ,2 ]
Shaikh, Humaiz [1 ]
Khan, Mohammad Shadab [1 ]
Arbaaeen, Ammar [1 ]
Shah, Asadullah [1 ]
机构
[1] Int Islamic Univ Malaysia, Fac Informat & Commun Technol, Kuala Lumpur, Malaysia
[2] Sindh Agr Univ, Informat Technol Ctr, Tandojam, Pakistan
来源
2018 5TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGIES AND APPLIED SCIENCES (IEEE ICETAS) | 2018年
关键词
behavioral intention; secure software development; software security; UTAUT2; influencing factors;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An evidently dominant problem in the software development domain is that software security is not consistently addressed from the initial phase of software development which escalates security concerns, results in insecure software development. Several secure software development methodologies were introduced in literature and recommended to the industry but they are usually ignored by the developers and software practitioners. In this research paper, an extensive literature review is performed to find out factors influencing implementation of secure software development practices in industry. Secondly, Based on Unified Theory of Acceptance and Use of Technology model 2 (UTAUT2), this study proposes a model to investigate the factors influencing adoption of secure software development practices among software developers.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Ahmed Syed Faiz, 2013, COMP SCI ED ICCSE 20
[2]  
Bouaziz R., 2016, INF TECHN ORG DEV IT, P1
[3]  
Bouaziz R, 2011, LECT NOTES COMPUT SC, V6786, P607, DOI 10.1007/978-3-642-21934-4_49
[4]  
Fernandez EB, 2009, ADV INFORM SECUR, V45, P37, DOI 10.1007/978-0-387-88775-3_3
[5]   clasp: A conflict-driven answer set solver [J].
Gebser, Martin ;
Kaufmann, Benjamin ;
Neumann, Andre ;
Schaub, Torsten .
LOGIC PROGRAMMING AND NONMONOTONIC REASONING, PROCEEDINGS, 2007, 4483 :260-+
[6]   Are Companies Actually Using Secure Development Life Cycles? [J].
Geer, David .
COMPUTER, 2010, 43 (06) :12-16
[7]  
Howard M., 2009, The security development lifecycle
[8]  
Kanniah S. L., REV FACTORS INFLUENC
[9]  
Kanniah S.L., 2018, Journal of Telecommunication, Electronic and Computer Engineering, V2, P71
[10]  
Kobashi T., 2015, STUD NAT PROD CHEM, P1