{"id":"https://openalex.org/W4313549780","doi":"https://doi.org/10.1145/3551349.3561145","title":"Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development","display_name":"Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development","publication_year":2022,"publication_date":"2022-10-10","ids":{"openalex":"https://openalex.org/W4313549780","doi":"https://doi.org/10.1145/3551349.3561145"},"language":"en","primary_location":{"id":"doi:10.1145/3551349.3561145","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3561145","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3561145","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3561145","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077472707","display_name":"Debi Ashenden","orcid":"https://orcid.org/0000-0003-4105-1755"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]},{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU","GB"],"is_corresponding":true,"raw_author_name":"Debi Ashenden","raw_affiliation_strings":["School of Computer Science, University of Adelaide, Australia and School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Adelaide, Australia and School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094","https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006685374","display_name":"Gail Ollis","orcid":null},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gail Ollis","raw_affiliation_strings":["School of Computing, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015339352","display_name":"Iain Reid","orcid":"https://orcid.org/0000-0003-4072-7557"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Iain Reid","raw_affiliation_strings":["School of Criminology &amp; Criminal Justice, University of Portsmouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Criminology &amp; Criminal Justice, University of Portsmouth, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077472707"],"corresponding_institution_ids":["https://openalex.org/I5681781","https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":0.6065,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75587309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.5634966492652893},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5229547619819641},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4805889129638672},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.47765910625457764},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46085992455482483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4537407159805298},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.41328197717666626},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20313191413879395},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.14487996697425842},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.12032246589660645}],"concepts":[{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.5634966492652893},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5229547619819641},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4805889129638672},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.47765910625457764},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46085992455482483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4537407159805298},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.41328197717666626},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20313191413879395},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14487996697425842},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.12032246589660645},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3551349.3561145","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3561145","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3561145","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3551349.3561145","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3551349.3561145","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3551349.3561145","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[{"id":"https://openalex.org/G3635028993","display_name":null,"funder_award_id":"EP/P011667/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4313549780.pdf"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W81685006","https://openalex.org/W882857864","https://openalex.org/W1979290264","https://openalex.org/W2012703979","https://openalex.org/W2016310229","https://openalex.org/W2025043113","https://openalex.org/W2027934419","https://openalex.org/W2028171449","https://openalex.org/W2053800530","https://openalex.org/W2118583675","https://openalex.org/W2120530751","https://openalex.org/W2124890572","https://openalex.org/W2246510362","https://openalex.org/W2301050748","https://openalex.org/W2305278139","https://openalex.org/W2403278646","https://openalex.org/W2541261609","https://openalex.org/W2588952840","https://openalex.org/W2728705211","https://openalex.org/W2737248101","https://openalex.org/W2794927838","https://openalex.org/W2941123418","https://openalex.org/W2943375670","https://openalex.org/W2950504429","https://openalex.org/W2972780856","https://openalex.org/W2996597775","https://openalex.org/W3030213528","https://openalex.org/W3031264381","https://openalex.org/W3031773546","https://openalex.org/W3090957174","https://openalex.org/W3128817531","https://openalex.org/W3172367548","https://openalex.org/W3178592347","https://openalex.org/W4233410239"],"related_works":["https://openalex.org/W2494121465","https://openalex.org/W4377233172","https://openalex.org/W1854749775","https://openalex.org/W4312971597","https://openalex.org/W2129556718","https://openalex.org/W1970818898","https://openalex.org/W3157838713","https://openalex.org/W4200095465","https://openalex.org/W945978269","https://openalex.org/W4225160120"],"abstract_inverted_index":{"Secure":[0],"software":[1,59,118,167,174,210],"development":[2,60],"has":[3],"become":[4],"an":[5],"increasingly":[6],"important":[7],"focus":[8],"for":[9,65,74],"research":[10,106,138,152,170],"in":[11,19,186],"recent":[12],"years,":[13],"not":[14],"least":[15],"because":[16],"of":[17,184,195,209],"advances":[18],"technology":[20,52],"such":[21,50],"as":[22,153,201,203],"AI,":[23],"machine":[24],"learning":[25],"(AI/ML),":[26],"robotics,":[27],"and":[28,33,38,57,72,99,120,128,147,176,212,218],"autonomous":[29],"systems":[30],"(RAS).":[31],"AI/ML":[32],"RAS":[34],"facilitate":[35],"automated":[36],"decision-making":[37],"have":[39,43,70],"the":[40,142,193,207],"capability":[41],"to":[42,54,88,109,113,158,181,192,215],"a":[44,62,154,182],"significant":[45],"impact":[46],"on":[47],"society.":[48],"As":[49],"this":[51,83,115,151],"needs":[53],"be":[55],"trustworthy,":[56],"secure":[58,76,217],"is":[61,84],"key":[63],"attribute":[64],"trustworthiness.":[66],"Software":[67],"developers":[68,119,175,211],"frequently":[69],"responsibility":[71,127],"accountability":[73,129],"delivering":[75],"code":[77],"but":[78],"limited":[79,103],"authority":[80],"over":[81],"how":[82,112],"achieved.":[85],"Authority":[86],"tends":[87],"lie":[89],"with":[90,102,165],"cyber":[91,121,177,198],"security":[92,96,122,178,199],"professionals":[93,179],"who":[94],"mandate":[95],"processes,":[97],"tools":[98],"training,":[100],"often":[101],"success.":[104],"Our":[105,169],"objective":[107],"was":[108],"better":[110],"understand":[111],"bridge":[114],"gap":[116],"between":[117,144],"practitioners":[123],"so":[124],"that":[125,139,172],"authority,":[126],"are":[130],"shared":[131],"equally.":[132],"We":[133,149],"took":[134],"inspiration":[135],"from":[136,162,206],"healthcare":[137],"looks":[140],"at":[141],"relationship":[143],"compliance,":[145],"adherence":[146],"concordance.":[148],"use":[150],"lens":[155],"through":[156],"which":[157],"analyse":[159],"qualitative":[160],"data":[161],"35":[163],"interviews":[164],"professional":[166],"developers.":[168],"suggests":[171],"if":[173],"move":[180],"point":[183],"concordance":[185],"their":[187],"interactions":[188],"it":[189],"could":[190],"lead":[191,214],"negotiation":[194],"more":[196,216],"realistic":[197],"solutions,":[200],"well":[202],"removing":[204],"friction":[205],"practice":[208],"ultimately":[213],"trustworthy":[219],"systems.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-01-24T23:23:39.755997","created_date":"2025-10-10T00:00:00"}
