2010
DOI: 10.1145/1838687.1838701
|View full text |Cite
|
Sign up to set email alerts
|

Research on software security awareness

Abstract: People attack software deliberately to steal highly sensitive as well as personal information with the sole intention of carrying out well-funded, destructive and unethical goals that could harm individuals, nations or the whole world. Available technological controls could be implemented to tighten access and minimize persistent threats but the complete solution of secure software could only be provided by changing the behavior of the people involved. This can be achieved through effective security awareness … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Perceived behavioral control (Lack of awareness) User's carelessness together with a lack of knowledge in differentiating between spoofed and genuine websites leads users to fall victims to such attacks (Zhang, Ren, & Jiang, 2016). In this respect, lack of awareness of phishing is a major factor for most compromises (Banerjee, & Pandey, 2010;Gupta, Arachchilage, & Psannis, 2018). Subsequently, the user's inability to differentiate between a genuine email and a phishing email from the words contained in the subject and body of an email, respectively, will generally contribute to the reasons why humans fall for spear phishing attacks (Hong, 2012).…”
Section: User Vulnerabilities In Spear Phishingmentioning
confidence: 99%
“…Perceived behavioral control (Lack of awareness) User's carelessness together with a lack of knowledge in differentiating between spoofed and genuine websites leads users to fall victims to such attacks (Zhang, Ren, & Jiang, 2016). In this respect, lack of awareness of phishing is a major factor for most compromises (Banerjee, & Pandey, 2010;Gupta, Arachchilage, & Psannis, 2018). Subsequently, the user's inability to differentiate between a genuine email and a phishing email from the words contained in the subject and body of an email, respectively, will generally contribute to the reasons why humans fall for spear phishing attacks (Hong, 2012).…”
Section: User Vulnerabilities In Spear Phishingmentioning
confidence: 99%
“…Additionally, there is no specific security role inside FDD [66][67][68]. Of course there are many security methods that been applied in the real world [69][70][71][72][73][74][75][76][77][78][79][80], especially in Malaysia [80] and India [81].There is also discussion and much awareness among IT organizations regarding software security practices [82] and the human factors that could attribute to software security [83].However, there is no specific research regarding the integration of security and FDD.…”
Section: Q3: How Is the Integration Between Security And Fddmentioning
confidence: 99%
“…Other programming activities, such as producing functions and data structures, can be automated, or assisted by AI. It also highlights software security rules [ 1 ], standards, policies, protocols, and some awareness [ 2 ] mechanisms. It focuses on embedding intelligence into methodologies designed to solve diverse software engineering jobs to achieve high efficacy and efficiency [ 4 , 8 ].…”
mentioning
confidence: 99%