Research Article
An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development
@INPROCEEDINGS{10.1007/978-3-319-78816-6_3, author={Yeslam Al-Saggaf}, title={An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development}, proceedings={Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings}, proceedings_a={SECURECOMM \& ATCS \& SEPRIOT}, year={2018}, month={4}, keywords={Compromising security Australian organizations Systems development IT professionals Professional ethics}, doi={10.1007/978-3-319-78816-6_3} }
- Yeslam Al-Saggaf
Year: 2018
An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development
SECURECOMM & ATCS & SEPRIOT
Springer
DOI: 10.1007/978-3-319-78816-6_3
Abstract
This study looks into (1) the frequency with which Australian IT professionals compromise security to meet deadlines; (2) the causes of unprofessional behavior in the IT work place; (3) the best approach for tackling unprofessional behavior; and the effectiveness of this approach. These issues were addressed using a mixed research methodology that involved three data collection stages with the input of each stage being the output of the earlier stage. In the first stage, we conducted a survey of 2,315 Australian IT professionals which the Australian Computer Society helped promote. In the second stage, we interviewed 43 Australian IT professionals from six different Australian state capitals to understand the causes of unprofessional behavior in the IT work place and the best approach for tackling unprofessional behavior. Following the research participants’ suggestions, I implemented the approach suggested by the majority of participants. I then shared the links of the approach I implemented with the Australian IT professionals via the Australian Computer Society. In the final stage, I interviewed 28 IT professionals to receive their feedback with regards to the effectiveness of this approach in enhancing young IT professionals’ abilities to recognize unprofessional behavior. This paper presents the results from the three stages of this study.