An Adoption Theory of Secure Software Development Tools PI: Emerson Murphy-Hill Students: Jim Shepherd and Shundan Xiao.

Slides:



Advertisements
Similar presentations
The Evaluation of Illinois State Board of Educations Regional System of Support Providers (RESPROs) May 2009.
Advertisements

Lesson 1: Introduction to IT Business and Careers
Chapter 11Kotabe & Helsen's Global Marketing Management, Third Edition, Global Marketing Management Masaaki Kotabe & Kristiaan Helsen Third Edition.
What is Diffusion? The process of communicating innovation through certain channels over time through members of a social system.
1 IAC Emerging Technologies SIG: SOA Committee SOA Survey Results Steve Olding, Everware-CBDI John A. Smith, Ventera Corporation Fourth Service Oriented.
Peer Interaction Effectively, yet Infrequently, Enables Programmers to Discover New Tools Emerson Murphy-Hill North Carolina State University Gail Murphy.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
Why don’t innovation models help with informatics implementations? Rod Ward University of the West of England Medinfo 2010.
Attributes of Innovations How the properties of an innovation affect their rate of adoption.
Western Regional Biomedical Collaboratory Creating a culture for collaboration.
Chapter 11 Training for Organizations The Trainer as Change Agent.
Diffusion of Innovation Everett M. Rogers, 1995 (4 th edition) Diffusion is the process by which (1) an innovation (2) is communicated through certain.
MIS 648 Lecture 131 MIS 648 Presentation Notes: Lecture 13 Managing IT Offshoring: Is it a good thing?
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN Cross Cutting Themes Jonathan Grudin John Walsh Deb Agarwal.
Diffusion of Innovation How New Ideas, Practices, and Technologies Spread Content from
DIFFUSION OF INNOVATIONS
Diffusion of Innovations Theory Tyra JanssonTyra Jansson H571 Principles of Health BehaviorH571 Principles of Health Behavior.
Professor Sadie Creese Professor Koen Lamberts Nick Papanikolaou Research Fellow International Digital Laboratory University of Warwick
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Exploration into the barriers and obstacles constraining diffusion and adoption of renewable energy solutions Saskia Harkema and Mirjam Leloux Wittenborg.
Skunk Works Evaluation Tools: How do we know if we are having an impact?
Diffusion of Innovations Gerontology 820 Ashley Waldoch October 18, 2010.
1 Regional cluster adoption: The role of transaction costs, resource characteristics, and technology Grant Castner University of Oregon Peter Green University.
To adopt or not to adopt innovation : A case study of team-based learning Mark Freeman Higher Education.
1 Automation Adoption and Adaptation in the Air Traffic Control, URET Case Study Tatjana Bolic.
Journalism Next: Chapter 2: Advanced Blogging Cindy Royal, Ph.D Assistant Professor Texas State University School of Journalism and Mass Communication.
PAPER PRESENTATION: EMPIRICAL ASSESSMENT OF MDE IN INDUSTRY Erik Wang CAS 703.
Adopting innovations in agricultural industries Sally Marsh ABARE Outlook 2010: Productivity session.
The nature of the adoption process in agriculture David Pannell School of Agricultural and Resource Economics University of Western.
CPI Conference 2001 Making Virtual Teams Work Virtual Teams Project Team Chris Parker Parsons Energy & Chemicals Group Virtual Teams Project Team Chris.
Knowledge for development in sub- Saharan Africa: University-firm interaction in Nigeria, Uganda and South Africa Glenda Kruss, John Adeoti and Dani Nabudere.
Will It Work Here? A Decisionmaker's Guide to Adopting Innovations Amy Roussel, PhD, Program Director, RTI International – Presenter Cindy Brach, M.P.P.,
 Our answer the question -- “Can GM crops feed the poor”  Remember 70% of the food insecure in the World are farmers, farm workers and rural landless.
Theories of Communication Effects: Communication Science & Research
Review Presentation Wafaa Alsaggaf S May
DIFFUSION OF MOODLE Tiffany Harrell Walden University EDUC
Diffusion of Innovation
Chapter 4 Developing and Sustaining a Knowledge Culture
Chapter 4 Developing and Sustaining a Knowledge Culture
Diffusion of innovation Theory and concepts. Diffusion of Innovation Everett Rogers (1995) defined innovation diffusion as ‘the process by which an innovation.
ALEC 640 – Audrey Sepulveda October 27, 2015
© Lehman Associations, LLC 2015 Technology as a Strategic Asset Key Trends and Implications Tom Lehman Lehman Associates, LLC Lehman Reports Association.
Marv Adams Chief Information Officer November 29, 2001.
Three Critical Matters in Big Data Projects for e- Science Kerk F. Kee, Ph.D. Assistant Professor, Chapman University Orange, California
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 Cooperation and Opportunities for Standards in the New.
Adopting Simulation Technology to Teach Veterinary Emergency Response By Angela Clendenin ALEC 640 – Theory of Change October 20, 2015.
Adding Up Social Capital and Estimating Participation Frank Clearfield, Social Sciences Team Leader East NTSC, Greensboro, NC November 29, 2006.
[5.6] Roger’s Characteristics of Innovation & Consumers Essential idea: Innovations take time to diffuse into a target audience.
Factors affecting the adoption of e-assessment in School of Engineering by Z.G.Baleni Continuous Professional Development Unit CLTD, WSU 1/4/20161.
1 Fostering Change to successfully introduce and scale up proven health policies and practices Lourdes de la Peza Bangkok, 2010.
High Tech Marketing Fundamentals: Process and Product.
Understanding the Potential of IT
Diffusion of innovation Everett M. Rogers. It is a theory called Diffusion of Innovation invented by Everett Rogers.
Status Reports: Measuring against Mission National Institute of Standards and Technology U.S. Department of Commerce 1 Technology Program Evaluation: Methodologies.
Discussion of Challenges Skype. Who would you expect to be (or who are) the innovators and early adopters in your field of work for the innovation you.
Interview Design Four Focal States Connecticut, Indiana, North Carolina, Massachusetts Additional States Arizona, Utah, Washington State Interview Protocol.
DIFUSSION: Communications and Change Agents. Though Questions 1. What percent of you school and professional time is spent working with or communicating.
HENW Integrated Care Workforce Demonstrator Site Showcase Event Elizabeth Bradbury, Director 3 rd November 2015.
Born 1 Jan 2014 Lapland University of Applied Sciences.
Evaluation Methods for FOSS: the Business Readiness Rating Tony Wasserman Carnegie Mellon Silicon Valley Center for Open Source Investigation.
Diffusion of Innovation Theory
Diffusion of Innovation
Diffusion of Innovation
Software Engineering I
Supply Chain Transformation Highlights
Principles of Development
Diffusion of Innovation
Big Picture ? How We Learn Learning Theories Meaningful Tech Use
European Ethical Charter on the use of artificial intelligence in judicial systems and their environment.
FIT4RRI Focus Group Meeting to discuss objectives related to embedding of RRI in monitoring system research. Mary Jane Monaghan Joseph Spencer.
Presentation transcript:

An Adoption Theory of Secure Software Development Tools PI: Emerson Murphy-Hill Students: Jim Shepherd and Shundan Xiao

Context The National Security Agency is sponsoring a large-scale “Science of Security” project to make fundamental advances in security. Three sites: Carnegie Mellon University of Illinois, Urbana-Champaign North Carolina State

Background: Secure Software Tools To secure our complex systems, we must secure their software Software developers are the lynchpin of software security Developers can use practices and tools to build secure software Tools include static analysis tools, model checkers, and automated penetration testing tools But developers generally use very few of the tools available to them. Why?

Background: Adoption Theory Why new ideas are adopted (or not) has been extensively studied in diffusion of innovations, an interdisciplinary study. Used in: – Agricultural innovations – Social programs – New technologies – A little in software development Identifies the factors that lead to adoption and effective sustained use Everett Rogers. Diffusion of Innovations

Approach Identify the factors that lead to security tool adoption (and non-adoption) Step 1: Qualitatively identify factors Factors will help us make better tools, make smarter adoption decisions, and educate students

Method 43 Interviews with Software Developers Interviews semi-structured, some role-specific questions asked $50 gift card for participating

High Level Findings Relative advantage Compatibility Complexity Trialability Re-invention Characteristics of the innovation (security tools) Experience Inquisitiveness Company policy & standards Company culture Company domain & security concern Company structure Company training Social system factors Frequency of interaction Trust Characteristics of potential adopters (developers) Communication channels Company size Probability of adoption

Some Highlights Use of security tools may be low because it’s a preventative innovation: big distance between tools and their effects Far and away, developers are learning about security tools from their peers Developers may consider holistic cost of a tool, not just up front cost, but opportunity cost when sorting through false positives

More Highlights Company approval process effectively reduces trialability Tool integration into build system short- circuited many challenges of adoption Many developers felt they could rely on others to ensure security

Next Steps Year 2: Quantify – Distribute survey to people who have used tools – Distribute survey to wider developers, with vignettes Year 3: Predict and Refine – A-B testing case studies Year 4: Operationalize and Influence – Work with Industrial Extension Service to put theory to practice

Questions? Relative advantage Compatibility Complexity Trialability Re-invention Characteristics of the innovation (security tools) Experience Inquisitiveness Company policy & standards Company culture Company domain & security concern Company structure Company training Social system factors Frequency of interaction Trust Characteristics of potential adopters (developers) Communication channels Company size Probability of adoption