The pressure on software developers to produce secure has never been greater. But what does security look like in environments that do not security-critical software? In answer this question, multi-sited ethnographic study characterizes episodes and identifies five typical behaviors development. Using theory drawn from information motivation research engineering, article key ways which individu...