Socio-Technical Aspects in Security and Trust

نویسندگان

چکیده

The security attitudes and approaches of software developers have a large impact on the they produce, yet we know very little about how when these views are constructed. This paper investigates privacy (S&P) perceptions, experiences, practices current Computer Science students at graduate undergraduate level using semi-structured interviews. We find that already match many those been observed in professional developers. Students range hacker attack mindsets, lack experience with APIs, mixed view who is charge S&P life cycle, tendency to trust other peoples' code as convenient approach rapidly build software. discuss our results both curriculum development support for

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust in Technology: A Socio-Technical Perspective

Why should wait for some days to get or receive the trust in technology a socio technical perspective book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This trust in technology a socio technical perspective is well known book in the world, of course ...

متن کامل

Transforming Socio-Technical Security Requirements in SecBPMN Security Policies

Socio-Technical Systems (STSs) are complex systems composed of both social (i.e., humans and organizations) and technical (i.e., hardware and software) elements. Security requirements for STSs define constraints for the sociotechnical interactions and can be specified as a set of security policies that have to be satisfied by the components of the system during their interactions. In this paper...

متن کامل

On Tools for Socio-Technical Security Analysis

Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens because hackers prefer not to break security mechanisms immediately, but rather to target unguarded components first. Such components, e.g., users and human-computer ceremonies [2], are hacked by exploiting cognitive features (e.g., trust) and people’s dismay with ill-designed interfaces. These user-r...

متن کامل

Security analysis of socio-technical physical systems

Recent initiatives that evaluate the security of physical systems with objects as assets and people as agents –here called Socio-Technical Physical Systems– have limitations: their agent behaviour is too simple, they just estimate feasibility and not the likelihood of attacks, or they do estimate likelihood but on explicitly provided attacks only. We propose a model that can detect and quantify...

متن کامل

Socio-technical Security Analysis of Wireless Hotspots

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-55958-8