Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Charles Weir"'
Publikováno v:
Empirical Software Engineering. 28
Evidence from data breach reports shows that many competent software development teams still do not implement secure, privacy-preserving software, even though techniques to do so are now well-known. A major factor causing this is simply a lack of pri
Security and privacy concerns are vital in software for health-related applications. Yet often their development teams in small companies have little professional security support. To work effectively with them we should accept the complexity of thei
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::46f327c65867c8acafea509d2f0c6e4d
https://doi.org/10.1109/MSEC.2022.3221616
https://doi.org/10.1109/MSEC.2022.3221616
Autor:
Cecilia Loureiro-Koechlin, Jose-Rodrigo Cordoba-Pachon, Lynne Coventry, Soteris Demetriou, Charles Weir
Publikováno v:
2022 European Symposium on Usable Security.
Publikováno v:
ESEC/SIGSOFT FSE
Recent years have seen rapid increases in cybercrime. The use of effective software security activities plays an important part in preventing the harm involved. Objective research on industry use of software security practices is needed to help devel
Publikováno v:
Software: Practice and Experience. 50:275-298
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how. Unfortunately, these latter teams are still responsible for the security of the
Publikováno v:
ICSE (SEIP)
While the techniques to achieve secure, privacy-preserving software are now well understood, evidence shows that many software development teams do not use them: they lack the 'security maturity' to assess security needs and decide on appropriate too
Publikováno v:
Journal of Cybersecurity. 6
Development teams are increasingly expected to deliver secure code, but how can they best achieve this? Traditional security practice, which emphasizes ‘telling developers what to do’ using checklists, processes and errors to avoid, has proved di
Publikováno v:
ICSE (SEIP)
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how. Unfortunately, these latter teams are still responsible for the security of the
Autor:
Jeanette Dickinson, Margaret Mahool, Michelle S Davis, Melanie R Pedersen, Diane L Downie, Jennifer A Cockrill, Edecia Richards, Charles Weir, Julie Clement, Selena D. Ready, Mary Jane Chappell-Reed, Chris McGee, Cassidy Brown, Laura Nichole Bluemle, Bradley P Goodwin, Jeanne Eckes, Angela C. Brown, Sara E. Luckhaupt, Kitichia C Weekes, Thomas I Bowman, Ruby Lerner, Michael R Garner, Shirley A Mojica, Jonathan Smith, Lauren Brewer, Aaron Grober, Leisha D. Nolen, Neil M. Vora
Publikováno v:
Journal of emergency management (Weston, Mass.). 16(3)
Objective: To describe the challenges of service coordination through the National Disaster Medical System (NDMS) for Hurricane Maria evacuees, particularly those on dialysis.Design: Public health report.Setting: Georgia.Report: On November 25, 2017,
Autor:
Charles Weir
Publikováno v:
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).