Show simple item record

How to Conduct Security Studies with Software Developers

dc.contributor.advisorSmith, Matthew
dc.contributor.authorDanilova, Anastasia
dc.date.accessioned2022-07-13T12:41:30Z
dc.date.available2022-07-13T12:41:30Z
dc.date.issued13.07.2022
dc.identifier.urihttps://hdl.handle.net/20.500.11811/10063
dc.description.abstractAs our everyday life depends on software and its security, studies with software developers become ever more important. Motivated by multiple security breaches caused by issues during software development, more studies with software developers have to be conducted to investigate and help software developers create and test secure software. Thus, the design of security studies with software developers is a crucial task for researchers in Human Computer Interaction (HCI). While ample research has been conducted with end-users, there has been less investigation involving software developers. As with to end-user studies, different methods can be used to conduct studies with software developers, and the design decisions need to be made carefully and rationally. Since recruiting developers as study participants is difficult and costly, the decisions referring to study design have an increased value in the research process. Therefore, it is important to consider different methods before deciding on any one of them. In order to gain more insights into methodological design decisions, this thesis considers different approaches that have been used to conduct security studies with software developers. Five developer studies in different fields are conducted to investigate their methodological and usability- related implications. The findings of each study are analyzed at the primary level as well as a meta-level. While the primary level deals with the implications for that specific security topic, the meta level deals with methodological insights and findings. Based on these results, recommendations are offered on how to conduct security studies with software developers.en
dc.language.isoeng
dc.rightsIn Copyright
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectUsable Security
dc.subjectDeveloper Studies
dc.subject.ddc004 Informatik
dc.titleHow to Conduct Security Studies with Software Developers
dc.typeDissertation oder Habilitation
dc.publisher.nameUniversitäts- und Landesbibliothek Bonn
dc.publisher.locationBonn
dc.rights.accessRightsopenAccess
dc.identifier.urnhttps://nbn-resolving.org/urn:nbn:de:hbz:5-66555
ulbbn.pubtypeErstveröffentlichung
ulbbnediss.affiliation.nameRheinische Friedrich-Wilhelms-Universität Bonn
ulbbnediss.affiliation.locationBonn
ulbbnediss.thesis.levelDissertation
ulbbnediss.dissID6655
ulbbnediss.date.accepted02.05.2022
ulbbnediss.instituteMathematisch-Naturwissenschaftliche Fakultät : Fachgruppe Informatik / Institut für Informatik
ulbbnediss.fakultaetMathematisch-Naturwissenschaftliche Fakultät
dc.contributor.coRefereeKrombholz, Katharina
ulbbnediss.contributor.gnd1265210462


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

The following license files are associated with this item:

InCopyright