Association for Computing Machinery (ACM), ACM Transactions on Software Engineering and Methodology, 3(32), p. 1-29, 2023
DOI: 10.1145/3563211
Full text: Unavailable
The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development. Using theory drawn from information security and motivation research in software engineering, this article characterizes key ways in which individual developers form security responses to meet the demands of particular circumstances, providing a framework managers and teams can use to recognize, understand, and alter security activity in their environments.