Abstract
AbstractSoftware runs our modern day lives: our shopping, our transport and our medical devices. Hence, no citizen can escape the consequences of poor software engineering. A closely-aligned concern, which also touches every aspect of our lives, is cyber security. Software has to be developed with cybersecurity threats in mind, in order to design resistance and resilience into the software, given that they are often rooted in malicious human behaviour. Both software engineering and cyber security disciplines need to acknowledge and accommodate humans, not expect perfect performances. This is a position paper, delineating the extent of the challenge posed by this reality, and suggesting ways for accommodating the influence of human nature on secure software engineering.Practical Relevance: Socio-technical systems are made up of people, processes and technology. All can fail or be suboptimal. Software itself, being designed, developed and used by humans, is likely to malfunction. This could be caused by human error, or by malice. This paper highlights this reality, taking a closer look at all of the possible sources of malfunctioning technology. By doing so, I hope to infuse the management of socio-technical systems with an understanding and acknowledgement of this reality.
Publisher
Springer Science and Business Media LLC
Reference108 articles.
1. Abeyrathna A, Samarage C, Dahanayake B, Wijesiriwardana C, Wimalaratne P (2020) A security specific knowledge modelling approach for secure software engineering. J Natl Sci Found Sri lanka 48:1
2. Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46
3. Aeon B, Faber A, Panaccio A (2021) Does time management work? A meta-analysis. Plos One 16(1):e245066
4. Afzal R (2016) 6 reasons, software developers quit your company. https://www.linkedin.com/pulse/6-reasons-your-software-developers-quit-company-raheel-afzal/. Accessed 20 Dec 2022
5. Agrawal H, Alberi J, Bahler L, Conner W, Micallef J, Virodov A, Shane RS (2010) Preventing insider malware threats using program analysis techniques. In: 2010-MILCOM Military Communications Conference. IEEE, Piscataway, pp 936–941
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献