{"id":"https://openalex.org/W4312649381","doi":"https://doi.org/10.1109/csndsp54353.2022.9907931","title":"Security-Focused Prototyping: A Natural Precursor to Secure Development","display_name":"Security-Focused Prototyping: A Natural Precursor to Secure Development","publication_year":2022,"publication_date":"2022-07-20","ids":{"openalex":"https://openalex.org/W4312649381","doi":"https://doi.org/10.1109/csndsp54353.2022.9907931"},"language":"en","primary_location":{"id":"doi:10.1109/csndsp54353.2022.9907931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csndsp54353.2022.9907931","pdf_url":null,"source":{"id":"https://openalex.org/S4363605876","display_name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052210115","display_name":"Sam Attwood","orcid":"https://orcid.org/0000-0001-8140-6157"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Sam Attwood","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071520273","display_name":"Nana Onumah","orcid":null},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nana Onumah","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039563451","display_name":"Katie Paxton-Fear","orcid":"https://orcid.org/0000-0002-4472-8955"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Katie Paxton-Fear","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,United Kingdom","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079763361","display_name":"Rupak Kharel","orcid":"https://orcid.org/0000-0002-8632-7439"},"institutions":[{"id":"https://openalex.org/I185852735","display_name":"University of Central Lancashire","ror":"https://ror.org/010jbqd54","country_code":"GB","type":"education","lineage":["https://openalex.org/I185852735"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rupak Kharel","raw_affiliation_strings":["University of Central Lancashire,School of Psychology and Computer Science,Preston,United Kingdom","School of Psychology and Computer Science, University of Central Lancashire, Preston, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Central Lancashire,School of Psychology and Computer Science,Preston,United Kingdom","institution_ids":["https://openalex.org/I185852735"]},{"raw_affiliation_string":"School of Psychology and Computer Science, University of Central Lancashire, Preston, United Kingdom","institution_ids":["https://openalex.org/I185852735"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052210115"],"corresponding_institution_ids":["https://openalex.org/I11983389"],"apc_list":null,"apc_paid":null,"fwci":0.291,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54698376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6364515423774719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5323864221572876},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5103747248649597},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.49607357382774353},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.49225226044654846},{"id":"https://openalex.org/keywords/rapid-prototyping","display_name":"Rapid prototyping","score":0.48199859261512756},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.43521034717559814},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4250541925430298},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.38695505261421204},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.344698041677475},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3306136727333069},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.32499921321868896},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.27372342348098755},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2014485001564026},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09324917197227478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6364515423774719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5323864221572876},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5103747248649597},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.49607357382774353},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.49225226044654846},{"id":"https://openalex.org/C2780395129","wikidata":"https://www.wikidata.org/wiki/Q1128971","display_name":"Rapid prototyping","level":2,"score":0.48199859261512756},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.43521034717559814},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4250541925430298},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.38695505261421204},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.344698041677475},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3306136727333069},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.32499921321868896},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27372342348098755},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2014485001564026},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09324917197227478},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csndsp54353.2022.9907931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csndsp54353.2022.9907931","pdf_url":null,"source":{"id":"https://openalex.org/S4363605876","display_name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","raw_type":"proceedings-article"},{"id":"pmh:oai:clok.uclan.ac.uk:44263","is_oa":false,"landing_page_url":"https://clok.uclan.ac.uk/44263/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402361","display_name":"CLOK (University of Central Lancashire)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185852735","host_organization_name":"University of Lancashire","host_organization_lineage":["https://openalex.org/I185852735"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1976816600","https://openalex.org/W1996523416","https://openalex.org/W2008681738","https://openalex.org/W2022995025","https://openalex.org/W2024224225","https://openalex.org/W2039161213","https://openalex.org/W2134894205","https://openalex.org/W2156221105","https://openalex.org/W2241864412","https://openalex.org/W2294407885","https://openalex.org/W2609771094","https://openalex.org/W2742669564","https://openalex.org/W2766073798","https://openalex.org/W2828409123","https://openalex.org/W2884960840","https://openalex.org/W2888915331","https://openalex.org/W2903294440","https://openalex.org/W2941123418","https://openalex.org/W2954733199","https://openalex.org/W2965892416","https://openalex.org/W4205192141","https://openalex.org/W6673206665","https://openalex.org/W6690474551","https://openalex.org/W6754369729"],"related_works":["https://openalex.org/W1811024770","https://openalex.org/W4230385779","https://openalex.org/W2018644264","https://openalex.org/W2031957425","https://openalex.org/W2467594283","https://openalex.org/W4210963319","https://openalex.org/W1977527011","https://openalex.org/W3163146719","https://openalex.org/W4387872582","https://openalex.org/W2037791655"],"abstract_inverted_index":{"Secure":[0],"development":[1,26,35,44,74,95,136],"is":[2,45,122],"often":[3],"thought":[4],"of":[5,72,93,116,119,140,169,176],"as":[6,58,145],"a":[7,16,59],"proactive":[8],"approach":[9],"to":[10,28,62,79,96,132,164,180],"cyber":[11],"security.":[12],"Rather":[13],"than":[14],"building":[15],"technological":[17],"solution":[18],"and":[19,37,48,87,102,124,149,172],"then":[20],"securing":[21],"it":[22,104],"in":[23,50],"retrospect,":[24],"secure":[25,43,63,94,135],"strives":[27],"embed":[29],"good":[30],"security":[31,68,82],"practices":[32],"throughout":[33],"the":[34,70,73,91,100,113,130,138,167,174],"process":[36],"reduce":[38],"risk.":[39],"Unfortunately,":[40],"evidence":[41],"suggests":[42],"complex,":[46],"costly,":[47],"limited":[49],"practice.":[51],"This":[52],"article":[53],"therefore":[54],"introduces":[55],"security-focused":[56,127,170,181],"prototyping":[57,66,128,142,171],"natural":[60],"precursor":[61],"development.":[64],"Security-focused":[65],"embeds":[67],"at":[69],"beginning":[71],"process,":[75],"can":[76,88],"be":[77],"used":[78],"discover":[80],"domain-specific":[81],"requirements":[83],"through":[84,137],"active":[85,147],"learning,":[86,148],"help":[89],"communicate":[90],"complexity":[92],"organizations":[97],"such":[98,144],"that":[99,126],"resources":[101],"commitment":[103],"requires":[105],"are":[106],"better":[107],"understood.":[108],"A":[109],"case":[110,162],"study":[111],"considering":[112],"application":[114],"layer":[115],"an":[117],"Internet":[118],"Things":[120],"system":[121],"presented":[123],"shows":[125],"has":[129],"potential":[131,168],"facilitate":[133],"further":[134,165],"achievement":[139],"well-established":[141],"objectives,":[143],"communication,":[146],"reduced":[150],"time/costs.":[151],"Future":[152],"work":[153,158],"could":[154],"build":[155],"on":[156],"this":[157],"by":[159],"conducting":[160],"additional":[161],"studies":[163],"explore":[166],"investigating":[173],"importance":[175],"fidelity":[177],"with":[178],"regards":[179],"prototypes.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
