2020 3rd International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2020
DOI: 10.1109/iccais48893.2020.9096815
|View full text |Cite
|
Sign up to set email alerts
|

Motivational Company’s Characteristics to Secure Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…30 Moderator factors of software security and performance verification [105] The purpose of this article is to identify the moderating factors that impact security and performance verification, as well as propose actions to encourage their improvement. 31 Motivational Company's Characteristics to Secure Software [106] The objective of this study is to examine the attributes of organizations that influence the adoption of security practices in software development. 32 New hybrid methodology for secure systems [107] This article presents NHMSS, a novel secure methodology designed to ensure that security receives the necessary focus from the development team.…”
Section: N Article Citementioning
confidence: 99%
“…30 Moderator factors of software security and performance verification [105] The purpose of this article is to identify the moderating factors that impact security and performance verification, as well as propose actions to encourage their improvement. 31 Motivational Company's Characteristics to Secure Software [106] The objective of this study is to examine the attributes of organizations that influence the adoption of security practices in software development. 32 New hybrid methodology for secure systems [107] This article presents NHMSS, a novel secure methodology designed to ensure that security receives the necessary focus from the development team.…”
Section: N Article Citementioning
confidence: 99%
“…Software SME SSDLC adoption remains inadequate. Alghamdi [44] revealed that only 51 percent of software SMEs that develop software in-house adopted secure software practices during all phases of the SDLC. The reasons noted for the low SSDLC adoption in software SMEs are summarized as follows.…”
Section: Ssdlc Adoption Challenges In Smesmentioning
confidence: 99%
“…2) Complexity and cost: SSDLC is complex and costly to implement and practice leading to management overhead and lack of management support [14], [44], [45].…”
Section: Ssdlc Adoption Challenges In Smesmentioning
confidence: 99%
See 1 more Smart Citation
“…Various literature examining software security processes in organizations have considered traditional software security, which is focused on post-deployment security, to be inadequate, advocating instead for practicing a secure software development lifecycle (SSDLC) [7]- [9]. However, there is insufficient adoption of secure software practices throughout the SDLC, pronounced in SMEs that develop software in-house [10].…”
Section: Introductionmentioning
confidence: 99%