How to Conduct Security Studies with Software Developers
How to Conduct Security Studies with Software Developers
![Open Access](/xmlui/themes/Fakultaeten//images/32px-Open_Access_logo_PLoS_white.svg.png)
dc.contributor.advisor | Smith, Matthew | |
dc.contributor.author | Danilova, Anastasia | |
dc.date.accessioned | 2022-07-13T12:41:30Z | |
dc.date.available | 2022-07-13T12:41:30Z | |
dc.date.issued | 13.07.2022 | |
dc.identifier.uri | https://hdl.handle.net/20.500.11811/10063 | |
dc.description.abstract | As our everyday life depends on software and its security, studies with software developers become ever more important. Motivated by multiple security breaches caused by issues during software development, more studies with software developers have to be conducted to investigate and help software developers create and test secure software. Thus, the design of security studies with software developers is a crucial task for researchers in Human Computer Interaction (HCI). While ample research has been conducted with end-users, there has been less investigation involving software developers. As with to end-user studies, different methods can be used to conduct studies with software developers, and the design decisions need to be made carefully and rationally. Since recruiting developers as study participants is difficult and costly, the decisions referring to study design have an increased value in the research process. Therefore, it is important to consider different methods before deciding on any one of them. In order to gain more insights into methodological design decisions, this thesis considers different approaches that have been used to conduct security studies with software developers. Five developer studies in different fields are conducted to investigate their methodological and usability- related implications. The findings of each study are analyzed at the primary level as well as a meta-level. While the primary level deals with the implications for that specific security topic, the meta level deals with methodological insights and findings. Based on these results, recommendations are offered on how to conduct security studies with software developers. | en |
dc.language.iso | eng | |
dc.rights | In Copyright | |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject | Usable Security | |
dc.subject | Developer Studies | |
dc.subject.ddc | 004 Informatik | |
dc.title | How to Conduct Security Studies with Software Developers | |
dc.type | Dissertation oder Habilitation | |
dc.publisher.name | Universitäts- und Landesbibliothek Bonn | |
dc.publisher.location | Bonn | |
dc.rights.accessRights | openAccess | |
dc.identifier.urn | https://nbn-resolving.org/urn:nbn:de:hbz:5-66555 | |
ulbbn.pubtype | Erstveröffentlichung | |
ulbbnediss.affiliation.name | Rheinische Friedrich-Wilhelms-Universität Bonn | |
ulbbnediss.affiliation.location | Bonn | |
ulbbnediss.thesis.level | Dissertation | |
ulbbnediss.dissID | 6655 | |
ulbbnediss.date.accepted | 02.05.2022 | |
ulbbnediss.institute | Mathematisch-Naturwissenschaftliche Fakultät : Fachgruppe Informatik / Institut für Informatik | |
ulbbnediss.fakultaet | Mathematisch-Naturwissenschaftliche Fakultät | |
dc.contributor.coReferee | Krombholz, Katharina | |
ulbbnediss.contributor.gnd | 1265210462 |
Files in this item
This item appears in the following Collection(s)
-
E-Dissertationen (4120)