Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M.L., Fahl, S.: Developers need support, too: a survey of security advice for software developers. In: 2017 IEEE Cybersecurity Development (SecDev), pp. 22–26. IEEE, September 2017
Google Scholar
Aoyama, T., Nakano, T., Koshijima, I., Hashimoto, Y., Watanabe, K.: On the complexity of cybersecurity exercises proportional to preparedness. J. Disaster Res. 12(5), 1081–1090 (2017)
Article
Google Scholar
Barela, J., Gasiba, E.T., Suppan, S., Berges, M., Beckers, K.: When interactive graphic storytelling fails. In: 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW), pp. 164–169. IEEE, September 2019
Google Scholar
Beuran, R., Chinen, K.I., Tan, Y., Shinoda, Y.: Towards effective cybersecurity education and training. Research report. School of Information Science, Graduate School of Advanced Science and Technology, Japan Advanced Institute of Science and Technology. IS-RR-2016, April 2016, pp. 1–16 (2016)
Google Scholar
Carnegie Mellon University: SEI-CERT coding standards. https://wiki.sei.cmu.edu/confluence/display/seccode
Chung, K., Cohen, J.: Learning obstacles in the capture the flag model. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014). USENIX Association, San Diego (2014)
Google Scholar
CTFtime team: CTFTime - all about CTF. https://ctftime.org
Davis, A., Leek, T., Zhivich, M., Gwinnup, K., Leonard, W.: The fun and future of CTF. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014). USENIX Association, San Diego (2014)
Google Scholar
Dörner, R., Göbel, S., Effelsberg, W., Wiemeyer, J.: Serious Games: Foundations, Concepts and Practice, 1st edn. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40612-1
Book
Google Scholar
Gasiba, T., Beckers, K., Suppan, S., Rezabek, F.: On the requirements for serious games geared towards software developers in the industry. In: Damian, D.E., Perini, A., Lee, S. (eds.) 27th IEEE International Requirements Engineering Conference, RE 2019, Jeju Island, Korea (South), 23–27 September 2019. IEEE (2019)
Google Scholar
Graziotin, D., Fagerholm, F., Wang, X., Abrahamsson, P.: What happens when software developers are (un)happy. J. Syst. Softw. 140, 32–47 (2018)
Article
Google Scholar
Groves, R.M., Fowler, F., Couper, M., Lepkowski, J., Singer, E.: Survey Methodology, 2nd edn. Wiley, Hoboken (2009)
MATH
Google Scholar
Gonzalez, H., Llamas, R., Ordaz, F.: Cybersecurity teaching through gamification: aligning training resources to our syllabus. Res. Comput. Sci. 146, 35–43 (2017). https://doi.org/10.13053/rcs-146-1-4
Article
Google Scholar
Hänsch, N., Zinaida, B.: Specifying IT security awareness. In: 25th International Workshop on Database and Expert Systems Applications, Munich, Germany, pp. 326–330, September 2014
Google Scholar
IEC 62443-4-1: Security for industrial automation and control systems - part 4–1: secure product development lifecycle requirements. Standard, International Electrotechnical Commission, January 2018
Google Scholar
ISO: ISO 250xx Series. Standard, International Organization for Standardization, Geneva, CH (2005). http://iso25000.com/index.php/en/iso-25000-standards
ISO 27002: Information technology - security techniques - code of practice for information security controls. Standard, International Organization for Standardization, Geneva, CH, October 2013
Google Scholar
Krosnick, J.A.: Questionnaire design. In: Vannette, D.L., Krosnick, J.A. (eds.) The Palgrave Handbook of Survey Research, pp. 439–455. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-54395-6_53
Chapter
Google Scholar
Mirkovic, J., Peterson, P.: Class capture-the-flag exercises. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014) (2014)
Google Scholar
Nance, K., Hay, B., Bishop, M.: Secure coding education: are we making progress? In: 16th Colloquium for Information Systems Security Education, pp. 83–88, June 2012
Google Scholar
OWASP Top 10. https://www.owasp.org/images/7/72/OWASP_Top_10-2017_(en).pdf. Accessed June 2019
Oyetoyan, T.D., Milosheska, B., Grini, M., Soares Cruzes, D.: Myths and facts about static application security testing tools: an action research at telenor digital. In: Garbajosa, J., Wang, X., Aguiar, A. (eds.) XP 2018. LNBIP, vol. 314, pp. 86–103. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91602-6_6
Chapter
Google Scholar
Patel, S.: 2019 global developer report: DevSecOps finds security roadblocks divide teams, July 2020. https://about.gitlab.com/blog/2019/07/15/global-developer-report/. Accessed 15 July 2019
Rodriguez, M., Piattini, M., Ebert, C.: Software verification and validation technologies and tools. IEEE Softw. 36(2), 13–24 (2019)
Article
Google Scholar
SAFECode charter members: SAFECode - software assurance forum for excellence in code. https://safecode.org
Schneier, B.: Software developers and security, July 2020. https://www.schneier.com/blog/archives/2019/07/software_develo.html. Accessed 25 July 2019
Schonlau, M., Couper, M.: Semi-automated categorization of open-ended questions. Surv. Res. Methods 10(2), 143–152 (2016). https://ojs.ub.uni-konstanz.de/srm/article/view/6213
Seaman, C.: Qualitative methods in empirical studies of software engineering. IEEE Trans. Softw. Eng. 25(4), 557–572 (1999)
Article
Google Scholar
Smith, C.: Content analysis and narrative analysis. In: Handbook of Research Methods in Social and Personality Psychology, pp. 313–335 (2000)
Google Scholar
Tews, M.J., Noe, R.A.: Does training have to be fun? A review and conceptual model of the role of fun in workplace training. Hum. Resour. Manag. Rev. 29(2), 226–238 (2019)
Article
Google Scholar
Whiting, L.: Semi-structured interviews: guidance for novice researchers. Nurs. Stand. 22, 35–40 (2008)
Article
Google Scholar
Woody, C., Ellison, R., Nichols, W.: Predicting cybersecurity using quality data. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–5. IEEE (2015)
Google Scholar
Yang, X.L., Lo, D., Xia, X., Wan, Z.Y., Sun, J.L.: What security questions do developers ask? A large-scale study of stack overflow posts. J. Comput. Sci. Technol. 31(5), 910–924 (2016)
Article
Google Scholar