Project stakeholder engagement through gamification: what do we know and where do we go from here?
C Ingvarsson, A Hallin, C Kier - International Journal of Managing …, 2023 - emerald.com
Purpose The purpose of this paper is to explore how gamification may be used for project
stakeholder engagement. Design/methodology/approach The paper presents the results of …
stakeholder engagement. Design/methodology/approach The paper presents the results of …
" Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …
Utilizing these external components as building blocks enables companies to leverage the …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …
Making sense of the unknown: How managers make cyber security decisions
Managers rarely have deep knowledge of cyber security and yet are expected to make
decisions with cyber security implications for software-based systems. We investigate the …
decisions with cyber security implications for software-based systems. We investigate the …
" There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices
RE Thompson, M McLaughlin, C Powers… - 33rd USENIX Security …, 2024 - usenix.org
Threat modeling is considered an essential first step for" secure by design" development.
Significant prior work and industry efforts have created novel methods for this type of threat …
Significant prior work and industry efforts have created novel methods for this type of threat …
Incorporating software security: using developer workshops to engage product managers
Evidence from data breach reports shows that many competent software development teams
still do not implement secure, privacy-preserving software, even though techniques to do so …
still do not implement secure, privacy-preserving software, even though techniques to do so …
How do information strategy and information technology governance influence firm performance?
F Wang, J Lv, X Zhao - Frontiers in Psychology, 2022 - frontiersin.org
Organizations today engage in turbulent competition to seize opportunities and cope with
challenges by making strategy planning, increasing information technology (IT) investment …
challenges by making strategy planning, increasing information technology (IT) investment …
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception
The executive leadership in corporate organizations is increasingly challenged with
managing cyber-risks, as an important part of wider business risk management. Cyber-risks …
managing cyber-risks, as an important part of wider business risk management. Cyber-risks …
Seven pain points of threat analysis and risk assessment in the automotive domain
K Tuma, M Widman - IEEE Security & Privacy, 2021 - ieeexplore.ieee.org
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain Page 1
BUILDING SECURITY IN 78 September/October 2021 Copublished by the IEEE Computer and …
BUILDING SECURITY IN 78 September/October 2021 Copublished by the IEEE Computer and …
SME Cybersecurity Misconceptions: A Guide for Decision Makers
M Wilson, S McDonald - Cybersecurity for Decision Makers, 2023 - taylorfrancis.com
In this chapter, we explore small and medium-sized enterprises'(SMEs') attitudes to
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …