Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290605.3300370
|View full text |Cite
|
Sign up to set email alerts
|

"If you want, I can store the encrypted password"

Abstract: In 2017 and 2018, Naiakshina et al. [21, 22] studied in a lab setting whether computer science students need to be told to write code that stores passwords securely. The authors' results showed that, without explicit prompting, none of the students implemented secure password storage. When asked about this oversight, a common answer was that they would have implemented secure storage-if they were creating code for a company. To shed light on this possible confusion, we conducted a mixed-methods field study wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(22 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Prior work shows that if developers are prompted, nudged, or asked explicitly about security, they are more likely to choose secure solutions over insecure solutions [50,[68][69][70]74]. SATs have the potential to promote more secure coding by proactively identifying issues at early stages of development along with identifying the problematic line(s) and providing specific guidance on how to correct them.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Prior work shows that if developers are prompted, nudged, or asked explicitly about security, they are more likely to choose secure solutions over insecure solutions [50,[68][69][70]74]. SATs have the potential to promote more secure coding by proactively identifying issues at early stages of development along with identifying the problematic line(s) and providing specific guidance on how to correct them.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Related challenges faced by both users and developers or other specialists are found widely across the cybersecurity field, including passwords (e.g., Naiakshina et al, 2019) and encrypted email (Whitten & Tygar, 1999). The field of usable security seeks a fit between the security task and the humans expected to interact with it (Sasse et al, 2001).…”
Section: Human Factors and Social Sciencesmentioning
confidence: 99%
“…Quantitative Study. The recruitment of a reasonable number of professional software developers for quantitative research studies is challenging [5,9,49,52]. Thus, we used multiple channels for recruitment.…”
Section: Recruitmentmentioning
confidence: 99%
“…Software developers can also encounter security warnings while programming and, just like end users, can become frustrated by these messages. Examples of severe security issues in software development are the use of deprecated security parameters or functions for end user password storage in a database endangering a large amount of sensitive user data [4,[52][53][54] or the misuse of TLS enabling man-in-the middle attacks [32]. Consequently, improving security warnings for developers is a desirable research goal [43].…”
Section: Introductionmentioning
confidence: 99%