{"id":307,"date":"2025-04-28T20:53:36","date_gmt":"2025-04-28T20:53:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/iholl003\/?page_id=307"},"modified":"2025-04-28T20:54:37","modified_gmt":"2025-04-28T20:54:37","slug":"article-review-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/article-reviews\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p>Isabella Holloway<br>March 30, 2025<br>Article Review #2: The Role of Knowledge and Motivation in Strengthening Software Security<\/p>\n\n\n\n<p>Introduction<br>This article review looks at the \u201cSoftware Security in Practice: Knowledge and Motivation\u201d by Hala Assal,<br>Srivathsan G Morkonda, Muhammad Zaid Arif, and Sonia Chiasson. The study was published in the<br>International Journal of Cybersecurity and focuses on the interlaced roles of developers\u2019 security<br>knowledge and their motivation in executing secure coding practices.<\/p>\n\n\n\n<p>Principles of Social Science Relation<br>The study relates to social science principles by studying human behavior, particularly how software<br>developers&#8217; motivation and knowledge impact their security practices. It also evaluates organizational<br>behavior by analyzing how workplace environments and cultural factors affect developers&#8217; interactions<br>with security protocols. Lastly, it considers how knowledge acquisition impacts professional conduct<br>within societal structures.<\/p>\n\n\n\n<p>Hypotheses and Research Questions<br>How do developers gain security knowledge? Developers usually gain security knowledge by learning<br>from peers, trial and error, and self-teaching. Developers mainly rely on online resources and on-the-job<br>experience because of the lack of formal education in secure coding and peer mentorship is useful but<br>not always available.<br>What motivates them to follow secure development practices? Personal interest and a sense of<br>responsibility leads to a better adoption of secure practices, rather than motivation based on fear, rules,<br>or external pressure.<\/p>\n\n\n\n<p>Methods of Research<br>The qualitative research design was used by organizing 17 semi-structured interviews with software<br>developers. They used thematic analysis to identify patterns in how developers learn, what drives their<br>behavior, and how their work environments impact security practices.<\/p>\n\n\n\n<p>Data and Analysis<br>Developers typically lack formal training and instead rely on informal learning methods. A majority of<br>developers are motivated when they feel responsible for protecting users, while others feel disconnected<br>from security outcomes. Supportive organizational culture particularly impacted how much attention<br>developers gave to secure coding.<\/p>\n\n\n\n<p>Class Concepts Connection<br>The article ties in class concepts like intrinsic vs. extrinsic motivation, informal learning, and how<br>institutions shape behavior. It also reflects discussions on workplace norms and organizational<br>responsibility.<\/p>\n\n\n\n<p>Marginalized Groups and Social Implications<br>Access to security training and mentorship is not always equal. Developers from underrepresented<br>backgrounds like women or those without a formal computer science degree may encounter less<br>opportunities to connect with experienced mentors or have fewer opportunities to learn secure coding<br>practices. Workplace culture can also make it harder for marginalized individuals to voice their opinion<br>about security concerns or suggestions for improvement.<\/p>\n\n\n\n<p>Societal Contributions<br>This study helps us understand that keeping software secure isn\u2019t just about knowing the right coding<br>techniques. It\u2019s also about how people think and work. It shows that when developers feel motivated<br>and supported, they\u2019re more likely to care about writing secure code. It also encourages companies to<br>not only teach security but also build a work environment where developers want to follow practices.<\/p>\n\n\n\n<p>Conclusion<br>The \u201cSoftware Security in Practice: Knowledge and Motivation\u201d article shows that software security isn\u2019t<br>just a technical problem, but a human one. Developers need more than knowledge; they need<br>supportive environments and meaningful motivation. Organizations that recognize this can better<br>protect their users and strengthen cybersecurity overall.<\/p>\n\n\n\n<p>References<br>Assal, H., Morkonda, S. G., Arif, M. Z., &amp; Chiasson, S. (2025). Software security in practice: Knowledge and<br>motivation. Journal of Cybersecurity. https:\/\/doi.org\/10.1093\/cybsec\/tyaf005<br>https:\/\/academic.oup.com\/cybersecurity<br>Software security in practice: knowledge and motivation | Journal of Cybersecurity | Oxford Academic<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Isabella HollowayMarch 30, 2025Article Review #2: The Role of Knowledge and Motivation in Strengthening Software Security IntroductionThis article review looks at the \u201cSoftware Security in Practice: Knowledge and Motivation\u201d by Hala Assal,Srivathsan G Morkonda, Muhammad Zaid Arif, and Sonia Chiasson&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/article-reviews\/article-review-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30376,"featured_media":0,"parent":263,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/users\/30376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/307\/revisions\/308"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/263"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}