[HTML][HTML] Challenges with developing secure mobile health applications: Systematic review
B Aljedaani, MA Babar - JMIR mHealth and uHealth, 2021 - mhealth.jmir.org
Background: Mobile health (mHealth) apps have gained significant popularity over the last
few years due to their tremendous benefits, such as lowering health care costs and …
few years due to their tremendous benefits, such as lowering health care costs and …
A qualitative study of dependency management and its security implications
Several large scale studies on the Maven, NPM, and Android ecosystems point out that
many developers do not often update their vulnerable software libraries thus exposing the …
many developers do not often update their vulnerable software libraries thus exposing the …
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
The rapid development of Machine Learning (ML) has demonstrated superior performance
in many areas, such as computer vision and video and speech recognition. It has now been …
in many areas, such as computer vision and video and speech recognition. It has now been …
Understanding privacy-related questions on stack overflow
We analyse Stack Overflow (SO) to understand challenges and confusions developers face
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …
Do you really code? designing and evaluating screening questions for online surveys with programmers
A Danilova, A Naiakshina… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Recruiting professional programmers in sufficient numbers for research studies can be
challenging because they often cannot spare the time, or due to their geographical …
challenging because they often cannot spare the time, or due to their geographical …
Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …
studies involving software development technologies, often leading to the use of …
" Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …
Utilizing these external components as building blocks enables companies to leverage the …
Beyond bot detection: combating fraudulent online survey takers✱
Different techniques have been recommended to detect fraudulent responses in online
surveys, but little research has been taken to systematically test the extent to which they …
surveys, but little research has been taken to systematically test the extent to which they …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
Smart contract security: A practitioners' perspective
Smart contracts have been plagued by security incidents, which resulted in substantial
financial losses. Given numerous research efforts in addressing the security issues of smart …
financial losses. Given numerous research efforts in addressing the security issues of smart …