Information security
developer responsibility versus user responsibility
Keywords:
information security, data protection, developer-user responsibilityAbstract
Information security is a challenge that requires everyone's collaboration. This study analyzes the shared responsibility between software professionals and users in data protection. This study delves into the complex issue of information security, investigating the role of actors in data protection. Through a rigorous analysis of security policies and a comprehensive survey of professionals in the field, the work seeks to identify best practices to mitigate vulnerabilities and promote safe behaviors. The results of this research have the potential to inform security policies and practices in various organizations, contributing to a safer digital environment.
References
ACAR, Y.; STRANSKY, C.; WERMKE, D, et al. You Get Where You're Looking for: The Impact of Information Sources on Code Security. In: IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 1., 2016, San Jose (EUA). Anais [...], San Jose (EUA), 2016. p. 289-305.
BALEBAKO, R. A Survey of Security Advice for Software Developers. IEEE Security & Privacy, [S.l.], 2014. Disponível em: https://ieeexplore.ieee.org/abstract/document/8077802. Acesso em: 07 jun 2024.
BISHOP, What Is Computer Security?, 2003.
BRASIL. Presidência da República. Lei nº 13.709, de 14 de agosto de 2018. Lei Geral de Proteção de Dados Pessoais (LGPD). Brasília: Presidência da República, [2018]. Disponível em: https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/l13709.htm. Acesso em: 10 jun. 2024.
BULGURCU, B.; CAVUSOGLU, H.; BENBASAT. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, Mineápolis, v. 34, 2010, p. 523-548.
CAVOUKIAN, A. Privacy by design: the definitive workshop. Identity in the Information Society, Berlim, v. 3, 2010, p. 247-251.
CAVOUKIAN, A. Privacy by Design: The 7 Foundational Principles. Ontario, 2011. Disponível em: https://www.datatilsynet.no/globalassets/global/bilder/rettigheter-og-plikter/innebygd-personvern/7foundationalprinciples_anncavoukian2.pdf. Acesso em: 14 jun. 2024.
FONTES, E. Segurança da Informação: o usuário faz a diferença. 1 ed. São Paulo: Saraiva, 2006.
FURNELL, S.; CLARKE, N. Power to the people? The evolving recognition of human aspects of security. 2012. Disponível em: https://www.sciencedirect.com/science/article/abs/pii/S0167404812001228. Acesso em: 17 jun. 2024
HOWARD, M.; LIPNER, S. The security development lifecycle: SDL: a process for developing demonstrably more secure software. Microsoft Press, 2009.
KRITZINGER, E.,VON SOLMS, R. Cyber security for home users: a new way of protection through awareness enhancement. Computers & Security, 2004.
NAKAMURA, E.; GEUS, P. Segurança de redes em ambientes corporativos. São Paulo: Berkeley Brasil, 2002.
ZALEWSKI, M. Software security: A guide for project managers. Routledge, 2019.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Seminário Internacional de Informação, Tecnologia e Inovação
This work is licensed under a Creative Commons Attribution 4.0 International License.
Os autores que tiverem seus trabalhos submetidos e publicados concordam que mantêm os respectivos direitos autorais e concedem ao Seminário Internacional de Informação, Tecnologia e Inovação (SITI) o direito de publicação simultaneamente disponibilizada de acordo com uma Licença Creative Commons - Atribuição 4.0 Internacional.