Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Static analysis tools (SATs) have the potential to assist developers in finding and fixing vulnerabilities in the early stages of software development, requiring them to be able to understand and act on tools' notifications. To understand how helpful such SAT guidance is to developers, we ran an online experiment (N=132) where participants were shown four vulnerable code samples (SQL injection, hard-coded credentials, encryption, and logging sensitive data) along with SAT guidance, and asked to indicate the appropriate fix. Participants had a positive attitude towards both SAT notifications and particularly liked the example solutions and vulnerable code. Seeing SAT notifications also led to more detailed open-ended answers and slightly improved code correction answers. Still, most SAT (SpotBugs 67%, SonarQube 86%) and Control (96%) participants answered at least one code-correction question incorrectly. Prior software development experience, perceived vulnerability severity, and answer confidence all positively impacted answer accuracy.
Original languageEnglish
Title of host publicationProceedings of the SIGCHI Conference on Human Factors in Computing Systems
PublisherAssociation for Computing Machinery (ACM)
Number of pages15
Publication statusPublished - 8 May 2021
EventThe ACM CHI Conference on Human Factors in Computing Systems 2021 - Virtual Conference, Japan
Duration: 8 May 202113 May 2021
https://chi2021.acm.org/

Conference

ConferenceThe ACM CHI Conference on Human Factors in Computing Systems 2021
Abbreviated titleCHI 2021
CountryJapan
CityVirtual Conference
Period8/05/2113/05/21
Internet address

Keywords

  • usable security
  • software developers
  • security notifications
  • static analysis

Fingerprint Dive into the research topics of 'Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges'. Together they form a unique fingerprint.

Cite this