Project stakeholder engagement through gamification: what do we know and where do we go from here?

C Ingvarsson, A Hallin, C Kier - International Journal of Managing …, 2023 - emerald.com
Purpose The purpose of this paper is to explore how gamification may be used for project
stakeholder engagement. Design/methodology/approach The paper presents the results of …

" Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain

D Wermke, JH Klemmer, N Wöhler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …

Making sense of the unknown: How managers make cyber security decisions

B Shreeve, C Gralha, A Rashid, J Araujo… - ACM Transactions on …, 2023 - dl.acm.org
Managers rarely have deep knowledge of cyber security and yet are expected to make
decisions with cyber security implications for software-based systems. We investigate the …

" There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices

RE Thompson, M McLaughlin, C Powers… - 33rd USENIX Security …, 2024 - usenix.org
Threat modeling is considered an essential first step for" secure by design" development.
Significant prior work and industry efforts have created novel methods for this type of threat …

Incorporating software security: using developer workshops to engage product managers

C Weir, I Becker, L Blair - Empirical Software Engineering, 2023 - Springer
Evidence from data breach reports shows that many competent software development teams
still do not implement secure, privacy-preserving software, even though techniques to do so …

How do information strategy and information technology governance influence firm performance?

F Wang, J Lv, X Zhao - Frontiers in Psychology, 2022 - frontiersin.org
Organizations today engage in turbulent competition to seize opportunities and cope with
challenges by making strategy planning, increasing information technology (IT) investment …

Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception

S Parkin, K Kuhn, SA Shaikh - Journal of Cybersecurity, 2023 - academic.oup.com
The executive leadership in corporate organizations is increasingly challenged with
managing cyber-risks, as an important part of wider business risk management. Cyber-risks …

Seven pain points of threat analysis and risk assessment in the automotive domain

K Tuma, M Widman - IEEE Security & Privacy, 2021 - ieeexplore.ieee.org
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain Page 1
BUILDING SECURITY IN 78 September/October 2021 Copublished by the IEEE Computer and …

SME Cybersecurity Misconceptions: A Guide for Decision Makers

M Wilson, S McDonald - Cybersecurity for Decision Makers, 2023 - taylorfrancis.com
In this chapter, we explore small and medium-sized enterprises'(SMEs') attitudes to
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …