[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2663887.2663898acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Technical and Personal Factors Influencing Developers' Adoption of Security Tools

Published: 07 November 2014 Publication History

Abstract

Security tools analyze programs to help software developers write more secure code. Although these tools have been demonstrated to find vulnerabilities that human developers may not, many developers do not use them, leaving software needlessly vulnerable. To help understand why, we describe a theoretical account of factors that influence developers' adoption decisions. This model was developed based on interviews with 42 professional developers, and is a first step toward a comprehensive theory of security tool adoption based on diffusion of innovations theory.

References

[1]
I. Ajzen. The theory of planned behavior. Organizational behavior and human decision processes, 1991.
[2]
P. Y. Chau and K. Lung Hui. Identifying early adopters of new IT products: A case of Windows 95. Information & Management, 33(5):225--230, May 1998.
[3]
S. Das, T. H.-J. Kim, L. A. Dabbish, and J. I. Hong. The effect of social influence on security sensitivity. SOUPS, 2014.
[4]
F. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, 13(3):319--340, 1989.
[5]
B. Johnson, Y. Song, E. Murphy-Hill, and R. Bowdidge. Why don't software developers use static analysis tools to find bugs? ICSE, pages 672--681, 2013.
[6]
L. Meyerovich and A. Rabkin. Empirical analysis of programming language adoption. OOPSLA, 48(10):1--18, Nov. 2013.
[7]
E. Murphy-Hill and G. C. Murphy. Peer interaction effectively, yet infrequently, enables programmers to discover new tools. CSCW, pages 405--414, 2011.
[8]
N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM SIGPLAN Notices, 42(6):89--100, 2007.
[9]
E. M. Rogers. Diffusion of innovations. 1995.
[10]
L. Singer. Improving the adoption of software engineering practices through persuasive interventions. PhD thesis, Gottfried Wilhelm Leibniz Universitüt Hannover, 2013.
[11]
S. Xiao, J. Witschey, and E. Murphy-Hill. Social Influences on Secure Development Tool Adoption: Why Security Tools Spread. CSCW, pages 1095--1106, 2014.

Cited By

View all
  • (2024)Towards Security-Focused Developer PersonasProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685406(1-18)Online publication date: 13-Oct-2024
  • (2024)Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by DevelopersProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670333(4226-4240)Online publication date: 2-Dec-2024
  • (2024)A Neuro-Fuzzy Security Risk Assessment System for Software Development Life CycleHeliyon10.1016/j.heliyon.2024.e33495(e33495)Online publication date: Jun-2024
  • Show More Cited By

Index Terms

  1. Technical and Personal Factors Influencing Developers' Adoption of Security Tools

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIW '14: Proceedings of the 2014 ACM Workshop on Security Information Workers
    November 2014
    66 pages
    ISBN:9781450331524
    DOI:10.1145/2663887
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adoption
    2. security

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS'14
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)145
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Towards Security-Focused Developer PersonasProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685406(1-18)Online publication date: 13-Oct-2024
    • (2024)Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by DevelopersProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670333(4226-4240)Online publication date: 2-Dec-2024
    • (2024)A Neuro-Fuzzy Security Risk Assessment System for Software Development Life CycleHeliyon10.1016/j.heliyon.2024.e33495(e33495)Online publication date: Jun-2024
    • (2023)"Security is not my field, I'm a stats guy"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620448(3763-3780)Online publication date: 9-Aug-2023
    • (2023)A mixed-methods study of security practices of smart contract developersProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620380(2545-2562)Online publication date: 9-Aug-2023
    • (2023)A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software DevelopmentACM Computing Surveys10.1145/358995155:14s(1-27)Online publication date: 4-Apr-2023
    • (2023)Blindspots in Python and Java APIs Result in Vulnerable CodeACM Transactions on Software Engineering and Methodology10.1145/357185032:3(1-31)Online publication date: 26-Apr-2023
    • (2023)Security Responses in Software DevelopmentACM Transactions on Software Engineering and Methodology10.1145/356321132:3(1-29)Online publication date: 26-Apr-2023
    • (2023)Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)10.1109/ICSE48619.2023.00140(1622-1634)Online publication date: May-2023
    • (2021)Benefits and drawbacks of adopting a secure programming languageProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563603(597-616)Online publication date: 9-Aug-2021
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media