{"id":"https://openalex.org/W4386307641","doi":"https://doi.org/10.1145/3616383","title":"A First Look into Software Security Practices in Bangladesh","display_name":"A First Look into Software Security Practices in Bangladesh","publication_year":2023,"publication_date":"2023-08-31","ids":{"openalex":"https://openalex.org/W4386307641","doi":"https://doi.org/10.1145/3616383"},"language":"en","primary_location":{"id":"doi:10.1145/3616383","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3616383","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3616383","source":{"id":"https://openalex.org/S4387291547","display_name":"ACM Journal on Computing and Sustainable Societies","issn_l":"2834-5533","issn":["2834-5533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Computing and Sustainable Societies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3616383","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087875395","display_name":"Ankit Shrestha","orcid":"https://orcid.org/0000-0002-9012-6146"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ankit Shrestha","raw_affiliation_strings":["Utah State University, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019575644","display_name":"Tanusree Sharma","orcid":"https://orcid.org/0000-0003-1523-163X"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tanusree Sharma","raw_affiliation_strings":["University of Illinois at Urbana Champaign, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana Champaign, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015629549","display_name":"Pratyasha Saha","orcid":"https://orcid.org/0000-0003-2987-672X"},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Pratyasha Saha","raw_affiliation_strings":["University of Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University of Dhaka, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089574660","display_name":"Syed Ishtiaque Ahmed","orcid":"https://orcid.org/0000-0003-2452-0687"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Syed Ishtiaque Ahmed","raw_affiliation_strings":["University of Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041581450","display_name":"Mahdi Nasrullah Al-Ameen","orcid":"https://orcid.org/0000-0002-5764-2253"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahdi Nasrullah Al-Ameen","raw_affiliation_strings":["Utah State University, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, USA","institution_ids":["https://openalex.org/I121980950"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087875395"],"corresponding_institution_ids":["https://openalex.org/I121980950"],"apc_list":null,"apc_paid":null,"fwci":2.5753,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90756355,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"1","issue":"1","first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.709582507610321},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.5384364724159241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4905526041984558},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.48939672112464905},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.48383989930152893},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.48024848103523254},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4760798513889313},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.47269749641418457},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4506318271160126},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.41854628920555115},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3969266712665558},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3445888161659241},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.34408456087112427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33136504888534546},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2703872621059418},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.18183952569961548},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.11479943990707397},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.09603947401046753},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.08925312757492065}],"concepts":[{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.709582507610321},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.5384364724159241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4905526041984558},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.48939672112464905},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.48383989930152893},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.48024848103523254},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4760798513889313},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.47269749641418457},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4506318271160126},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.41854628920555115},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3969266712665558},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3445888161659241},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.34408456087112427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33136504888534546},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2703872621059418},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.18183952569961548},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11479943990707397},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.09603947401046753},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.08925312757492065},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3616383","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3616383","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3616383","source":{"id":"https://openalex.org/S4387291547","display_name":"ACM Journal on Computing and Sustainable Societies","issn_l":"2834-5533","issn":["2834-5533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Computing and Sustainable Societies","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_stures-1037","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_stures/40","pdf_url":null,"source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Student Research","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3616383","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3616383","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3616383","source":{"id":"https://openalex.org/S4387291547","display_name":"ACM Journal on Computing and Sustainable Societies","issn_l":"2834-5533","issn":["2834-5533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Computing and Sustainable Societies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386307641.pdf","grobid_xml":"https://content.openalex.org/works/W4386307641.grobid-xml"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W72496981","https://openalex.org/W1495479466","https://openalex.org/W1516691994","https://openalex.org/W1951008065","https://openalex.org/W1968335087","https://openalex.org/W1970008263","https://openalex.org/W1973601758","https://openalex.org/W1979290264","https://openalex.org/W1991286899","https://openalex.org/W1999291729","https://openalex.org/W2023992080","https://openalex.org/W2033811191","https://openalex.org/W2050830488","https://openalex.org/W2057366964","https://openalex.org/W2059507980","https://openalex.org/W2086007171","https://openalex.org/W2102677318","https://openalex.org/W2114301279","https://openalex.org/W2129426180","https://openalex.org/W2139179587","https://openalex.org/W2145994642","https://openalex.org/W2150335690","https://openalex.org/W2337266384","https://openalex.org/W2357927175","https://openalex.org/W2406597851","https://openalex.org/W2525004287","https://openalex.org/W2540735130","https://openalex.org/W2541261609","https://openalex.org/W2585818648","https://openalex.org/W2611499662","https://openalex.org/W2616332126","https://openalex.org/W2617081094","https://openalex.org/W2698406033","https://openalex.org/W2742827529","https://openalex.org/W2775715748","https://openalex.org/W2778244123","https://openalex.org/W2792425537","https://openalex.org/W2808840625","https://openalex.org/W2909804508","https://openalex.org/W2945001297","https://openalex.org/W3030024562","https://openalex.org/W3031020798","https://openalex.org/W3036695520","https://openalex.org/W3038411287","https://openalex.org/W3039982061","https://openalex.org/W3101072120","https://openalex.org/W3154477588","https://openalex.org/W3161073803","https://openalex.org/W4214810323","https://openalex.org/W4242876994","https://openalex.org/W4244899690","https://openalex.org/W4285204502","https://openalex.org/W4309758061","https://openalex.org/W4366003765","https://openalex.org/W4383617019","https://openalex.org/W4383650100","https://openalex.org/W6602972026"],"related_works":["https://openalex.org/W4384518368","https://openalex.org/W2155353733","https://openalex.org/W3117252235","https://openalex.org/W1981466760","https://openalex.org/W658105165","https://openalex.org/W1486481742","https://openalex.org/W2106371080","https://openalex.org/W4240401768","https://openalex.org/W4248500578","https://openalex.org/W2018644264"],"abstract_inverted_index":{"Software":[0],"security":[1,20,34,88,96,104,120,140],"practices":[2,21,35,97,121,141],"are":[3],"critical":[4],"in":[5,49,71,98,106,122,142],"minimizing":[6],"vulnerabilities":[7,50],"and":[8,15,90,113,134],"protecting":[9],"unauthorized":[10],"access":[11],"to":[12,26,85,137],"the":[13,16,40,72,92,107,117,143],"code":[14],"system.":[17],"However,":[18],"software":[19,44,69,95,109,139],"outside":[22],"Western":[23],"countries":[24],"need":[25,31],"be":[27],"better":[28],"understood.":[29],"This":[30,55],"for":[32,131],"understanding":[33],"is":[36],"further":[37],"necessitated":[38],"by":[39],"increased":[41],"outsourcing":[42],"of":[43],"development":[45,110],"that":[46,65],"can":[47],"result":[48],"on":[51,61,116,125],"a":[52,63,67],"global":[53],"scale.":[54],"article":[56],"addresses":[57],"this":[58,76],"gap,":[59],"focusing":[60],"Bangladesh,":[62],"country":[64],"represents":[66],"booming":[68],"industry":[70],"Global":[73],"South.":[74],"In":[75],"study,":[77],"we":[78,128],"conducted":[79],"semi-structured":[80],"interviews":[81],"with":[82],"15":[83],"developers":[84],"understand":[86],"their":[87],"perceptions":[89],"identify":[91],"factors":[93],"influencing":[94],"Bangladesh.":[99,123],"Our":[100],"findings":[101],"unpack":[102],"how":[103],"fits":[105],"local":[108,144],"life":[111],"cycle":[112],"shed":[114],"light":[115],"challenges":[118],"deterring":[119],"Based":[124],"our":[126],"results,":[127],"provide":[129],"recommendations":[130],"developing":[132],"situated":[133],"sustainable":[135],"strategies":[136],"support":[138],"context.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":9}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
