Submitted:
08 July 2024
Posted:
08 July 2024
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
2. Background and Related Work
2.1. Motivations Behind the Study
2.2. Software Security
2.3. People's Maturity towards Secure Software Development
2.2.1. Dimensions of People Maturity
- i.
- Technical Proficiency and Skill Development: The identification and confirmation that the members of the team have the required competencies is perhaps the most essential element of people's maturity. Enlisting a professional training and education program on the best practices, instruments, and techniques of contemporary securities is also crucial.
- ii.
- Experience: The professional members of the team need to be able to use their expertise and analyze the probable problem related to security and then implement the principles learned most appropriately.
- iii.
- Process Adherence and Standardization: Excellent teams operate with standard methodologies and guidelines that contain security since the beginning of the development stage, for instance, SSDLC models.
- iv.
- Compliance: Thus, following the best practices of the industry and the legally compliant acts guarantees that the security will be the best and most updated.
- v.
- Communication and Collaboration and Interdisciplinary Coordination: Communication is essential because it helps the developers, security specialists, and other related stakeholders to ensure that the security requirements are understood and reflected in the development process.
- vi.
- Feedback Mechanisms: The development of sound feedback mechanisms enables the development team to quickly note or report on security issues as the project progresses.
- vii.
- Proactive Security Culture and Security Awareness: It is compelling to make security a part of a team culture where everyone understands the organization’s threats and actively seeks to prevent them.
- viii.
- Responsibility and Accountability: This gives them ownership of security tasks; in the process, individuals feel responsible for the overall security tasks.
- ix.
- Problem-Solving and Analytical Skills: Most well-established teams employ very formal and rational strategies like threat modeling and risk analysis to analyze the weaknesses in security systems.
- x.
- Decision Frameworks: By applying decision-support tools like Fuzzy-AHP, the teams can calculate security measures considering various factors and the fuzziness of the decision-making environment.
2.2.2. Benefits of People Maturity towards Secure Software Development
- i.
- Enhanced Security Posture: Originally, higher people's maturity meant a better ability to understand and eliminate security threats, thus improving security maturity.
- ii.
- Reduced Risk: Consequently, the secure maturity level of the formative team means the ability to independently assess the threats and threats handling, which leads to a decrease in the number of and the impacts due to security breaches.
- iii.
- Improved Compliance: Compliance with security standards and meeting regulatory standards increases, meaning the software is legal and complies with industry standards.
- iv.
- Increased Efficiency: That way, the practices are standardized, and communication is efficient in establishing means of providing security without overloading developers for a long time.
- v.
- Continuous Improvement: By practicing open acknowledgement that is not confined to learning through experience but goes further to embrace proactivity, the teams remain informed on the current security trends and hence make constant enhancements to security.
2.2.3. Achieving People Maturity towards Secure Software Development
- i.
- Invest in Training: Develop and implement continuing formal training sessions and seminars about new means and protection methods.
- ii.
- Implement Standard Processes: First, implement and apply the set of requirements for security across the entire project, not just the separate ones.
- iii.
- Foster a Security Culture: Encourage the organization's personnel, teams, and departments to embrace security matters.
- iv.
- Facilitate Communication: Promoting the free flow of information and patronizing the establishment of rapport between all the participating stakeholders, especially in designing the software.
- v.
- Utilize Decision-Making Tools: Utilize well-formalized decision-making approaches like Fuzzy-AHP in security-related decision-making.
2.3. Related Work
2.3.1. Human Factors in Software Security
2.3.2. Secure Software Development Lifecycle
2.3.3. Maturity Models
2.3.4. Decision-Making Frameworks
2.3.5. Roles of Human Factors and Security in Integration
2.3.6. Gaps and Opportunities
2.3.7. Conclusion
3. Research Methodology
3.1. Phase 1: Systematic Literature Review (SLR)
3.1.1. Step 1: Research Questions Identification
3.1.2. Step 2: Reviewing or Drafting Review Protocol
- Search Strategy: Specified keywords, databases, and search engines will be used.
- Inclusion and Exclusion Criteria: Selection of literature.
- Data Extraction: The type of data that can be mined from each study.
- Quality Assessment: The quality of the studies included in the review is also considered.
3.1.3. Step 3: Search String Designing and Implementing
3.1.4. Step 4: Screening and Selecting Studies
3.1.5. Step 5: Data Extraction
- Study Title
- Authors
- Publication Year
- Research Objectives
- Methodology
- Key Findings
- Limitations
- Recommendations for Future Research
3.1.6. Step 6: Quality Assessment
- Clarity of research objectives
- Rigor of the methodology
- Internal and external validity of the research
- Contribution to the field
- Honesty regarding certain constraints and perspectives
3.1.7. Step 7: Data Synthesis
3.1.8. Step 8: The Findings
3.2. Phase 2: Empirical Study
- This method eliminated the necessity for scheduling meetings or global travel, allowing for efficient data collection from experts across continents.
- Utilizing online resources that are both cost-effective and accessible, such as Google Online Form, made the implementation process more practical.
3.2.1. Development of Questionnaire Survey
3.2.2. The Pilot of Questionnaire Survey
3.1.3. Data Collection Sources
3.3. Phase-3: Fuzzy Analytical Hierarchy Process (FAHP)
3.3.1. Fuzzy Set
3.3.2. FAHP
4. Results and Data Analysis
4.1. RQ1: What are the Human Factors (Success Factors and Security Vulnerabilities), as Reported in the Literature and Real-World Industry, that Influence Secure Software Development Projects?
4.2. RQ2: What are the Similarities and Differences between HSFs and HSVFs, as Identified through Literature and Real-World Industries, that Influence SSD Projects?
- Top Success Factors: HSF1 (Skill and Expertise) and HSF2 (Awareness and Mindset) are rated highest in the literature review and empirical survey, indicating their critical importance in SSD projects.
- Consistency: Most factors show high consistency between literature and survey impacts, reflecting a general effect on their importance.
- Lower Impact Factors: HSF11 (Scalability and Flexibility) and HSF12 (Ethical and Cultural Sensitivity) are rated lower, suggesting these are less emphasized in practical settings than technical and managerial skills.
- Top Security Vulnerabilities: HSV1 (Lack of Security Awareness and Training) and HSV2 (Poor Communication and Collaboration) are consistently rated highest, highlighting their significant impact on security.
- Variability: There is more variability in the impact percentages of vulnerabilities than success factors, suggesting differences in perceptions of vulnerability impacts.
- Lower Impact Vulnerabilities: HSV10 (Cultural Issues), HSV11 (Insufficient Incident Response Preparedness), and HSV12 (Over-Reliance on Tools) are rated lower, indicating these are perceived as less critical compared to others.
4.3. RQ3: What are the Practices For Addressing HSFs and HSVFs, as Identified through Literature Review and Real-World Industries, that Influence SSD Projects?
4.4. RQ4: How Can a Decision-Making Framework Be Developed to Identify the Weights of Maintenance and Deployment Security Risks in Healthcare System Software Development?
4.4.1. Step-1: Sorting out a problem's components (HSFs and HSVs practices) using a hierarchical framework
4.4.2. Step-2: Comparing Matrix Pairs
4.4.3. Step 3: Consistency Evaluation
4.4.4. Step 4: Identification of Local Priority Weight of HSFs and HSVs Practices Categories
4.4.5. Step 5: How to calculate the local and global weights and ranks of HSF and HSV practices
5. Securing Software Development through People Maturity: A Fuzzy-AHP Decision-Making Framework
6. Implications of the Study
- For Academics: This study consolidates a comprehensive overview of HSFs and HSVs and their practices in SSD projects. Meticulously reviewing academic and published materials contributes to a valuable knowledge base. Researchers can leverage these findings to establish practical SSD projects, enhancing secure software development strategies. This study encourages SSD academia to incorporate the most prevalent HSFs and HSVs and their practices for SSD in their ongoing and future projects.
- For Practitioners: Industry experts gain insights into HSFs and HSVs and their practices in secure software development through an extensive literature review and empirical studies. Identifying 12 HSFs and 12 HSVs and 38 prioritized practices for SSD processes, this study aids professionals in implementing robust security measures. By addressing and mitigating these HSFs and HSVs, practitioners can refine existing techniques and devise novel approaches for the seamless adoption of HSFs and HSVs in SSD practices. The comprehensive overview offered by this study assists practitioners in recognizing critical security HSF and HSV practices pivotal for SSD projects.
7. Summary and limitation of the study
8. Conclusion and Future Direction
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Del-Real, C.; De Busser, E.; Berg, B.v.D. Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review. Comput. Law Secur. Rev. 2024, 52. [Google Scholar] [CrossRef]
- Jørgensen, M.; Escott, E. Relative estimates of software development effort: Are they more accurate or less time-consuming to produce than absolute estimates, and to what extent are they person-independent? Inf. Softw. Technol. 2021, 143, 106782. [Google Scholar] [CrossRef]
- Khan, R.A.; Akbar, M.A.; Rafi, S.; Almagrabi, A.O.; Alzahrani, M. Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis. J. Software: Evol. Process. 2023, 36. [Google Scholar] [CrossRef]
- Barros, L.; Tam, C.; Varajão, J. Agile software development projects–Unveiling the human-related critical success factors. Inf. Softw. Technol. 2024, 170. [Google Scholar] [CrossRef]
- Jadhav, A.; Shandilya, S.K. Reliable machine learning models for estimating effective software development efforts: A comparative analysis. J. Eng. Res. 2023, 11, 362–376. [Google Scholar] [CrossRef]
- Nurwidyantoro, A.; Shahin, M.; Chaudron, M.R.; Hussain, W.; Shams, R.; Perera, H.; Oliver, G.; Whittle, J. Human values in software development artefacts: A case study on issue discussions in three Android applications. Inf. Softw. Technol. 2021, 141, 106731. [Google Scholar] [CrossRef]
- Adolph, S.; Kruchten, P.; Hall, W. Reconciling perspectives: A grounded theory of how people manage the process of software development. J. Syst. Softw. 2012, 85, 1269–1286. [Google Scholar] [CrossRef]
- Anu, V. Z. Sultana, and B.K. Samanthula. A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities. in 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). 2020.
- Fontana, R.M. , et al., Processes versus people: How should agile software development maturity be defined? Journal of Systems and Software, 2014. 97: p. 140-155.
- Martins, J.; Branco, F.; Mamede, H. Combining low-code development with ChatGPT to novel no-code approaches: A focus-group study. Intell. Syst. Appl. 2023, 20. [Google Scholar] [CrossRef]
- Pottebaum, J.; Rossel, J.; Somorovsky, J.; Acar, Y.; Fahr, R.; Cabarcos, P.A.; Bodden, E.; Gräßler, I. Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). LOCATION OF CONFERENCE, NetherlandsDATE OF CONFERENCE; pp. 379–385.
- Fujdiak, R. , et al. Managing the Secure Software Development. in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 2019.
- Averin, A.; Zyulyarkina, N. Characteristics of a Random Vector Obtained Using Human-Computer Interaction. 2020 Global Smart Industry Conference (GloSIC). LOCATION OF CONFERENCE, RussiaDATE OF CONFERENCE; pp. 271–275.
- Zhanwei, H. , et al. Software security testing based on typical SSD:A case study. in 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE). 2010.
- Khan, R.A.; Khan, S.U.; Khan, H.U.; Ilyas, M. Systematic Mapping Study on Security Approaches in Secure Software Engineering. IEEE Access 2021, 9, 19139–19160. [Google Scholar] [CrossRef]
- van Solingen, R.; Berghout, E.; Kusters, R.; Trienekens, J. From process improvement to people improvement: enabling learning in software development. Inf. Softw. Technol. 2000, 42, 965–971. [Google Scholar] [CrossRef]
- Khan, R.A.; Khan, S.U.; Alzahrani, M.; Ilyas, M. Security Assurance Model of Software Development for Global Software Development Vendors. IEEE Access 2022, 10, 58458–58487. [Google Scholar] [CrossRef]
- Khan, R.A.; Khan, S.U.; Khan, H.U.; Ilyas, M. Systematic Literature Review on Security Risks and its Practices in Secure Software Development. IEEE Access 2022, 10, 5456–5481. [Google Scholar] [CrossRef]
- Alzahrani, A.; Khan, R.A. Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach. Comput. Hum. Behav. 2024, 153. [Google Scholar] [CrossRef]
- Khan, R.A. , et al., Security risks of global software development life cycle: Industry practitioner's perspective. Journal of Software: Evolution and Process, 2024. 36(3): p. e2521.
- Khan, R.A. and S.U. Khan, A preliminary structure of software security assurance model, in Proceedings of the 13th International Conference on Global Software Engineering. 2018, Association for Computing Machinery: Gothenburg, Sweden. pp. 137–140.
- Khan, R.A. , et al., The State of the Art on Secure Software Engineering: A Systematic Mapping Study, in Proceedings of the 24th International Conference on Evaluation and Assessment in Software Engineering. 2020, Association for Computing Machinery: Trondheim, Norway. pp. 487–492.
- Khan, R.A., S. U. Khan, and M. Ilyas, Exploring Security Procedures in Secure Software Engineering: A Systematic Mapping Study, in Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering. 2022, Association for Computing Machinery: Gothenburg, Sweden. pp. 433–439.
- Alnaseef, F.; Niazi, M.; Mahmood, S.; Alshayeb, M.; Ahmad, I. Towards a successful secure software acquisition. Inf. Softw. Technol. 2023, 164. [Google Scholar] [CrossRef]
- Hofmans, L.; van der Stappen, A.; Bos, W.v.D. Developmental structure of digital maturity. Comput. Hum. Behav. 2024, 157. [Google Scholar] [CrossRef]
- Jukić, T.; Pluchinotta, I.; Hržica, R.; Vrbek, S. Organizational maturity for co-creation: Towards a multi-attribute decision support model for public organizations. Gov. Inf. Q. 2021, 39, 101623. [Google Scholar] [CrossRef]
- Koolen, C.; Wuyts, K.; Joosen, W.; Valcke, P. From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 2024, 52. [Google Scholar] [CrossRef]
- Kadenic, M.D.; Koumaditis, K.; Junker-Jensen, L. Mastering scrum with a focus on team maturity and key components of scrum. Inf. Softw. Technol. 2023, 153. [Google Scholar] [CrossRef]
- Glasauer, C. The Prevent-Model: Human and Organizational Factors Fostering Engineering of Safe and Secure Robotic Systems. J. Syst. Softw. 2023, 195. [Google Scholar] [CrossRef]
- Abad-Segura, E.; Infante-Moro, A.; González-Zamar, M.-D.; López-Meneses, E. Influential factors for a secure perception of accounting management with blockchain technology. J. Open Innov. Technol. Mark. Complex. 2024, 10. [Google Scholar] [CrossRef]
- De Win, B. , et al., On the secure software development process: CLASP, SDL and Touchpoints compared. Information and Software Technology, 2009. 51(7): p. 1152-1171.
- Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S. Systematic literature reviews in software engineering – A systematic literature review. Inf. Softw. Technol. 2008, 51, 7–15. [Google Scholar] [CrossRef]
- Kitchenham, B. and S. Charters, Guidelines for performing systematic literature reviews in software engineering. 2007.
- Dissanayake, N.; Jayatilaka, A.; Zahedi, M.; Babar, M.A. Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 2021, 144, 106771. [Google Scholar] [CrossRef]
- Shukla, A.; Katt, B.; Nweke, L.O.; Yeng, P.K.; Weldehawaryat, G.K. System security assurance: A systematic literature review. Comput. Sci. Rev. 2022, 45. [Google Scholar] [CrossRef]
- Kitchenham, B. , Procedures for performing systematic reviews. Keele, UK, Keele University, 2004. 33(2004): p. 1-26.
- Lethbridge, T.C.; Sim, S.E.; Singer, J. Studying Software Engineers: Data Collection Techniques for Software Field Studies. Empir. Softw. Eng. 2005, 10, 311–341. [Google Scholar] [CrossRef]
- Creswell, J.W. , Research design: qualitative, quantitative and mixed methods approaches, 3rd edition. 2009: Sage, London.
- Wagner, S. , et al., Status Quo in Requirements Engineering: A Theory and a Global Family of Surveys. ACM Trans. Softw. Eng. Methodol., 2019. 28(2): p. Article 9.
- Humayun, M.; Niazi, M.; Assiri, M.; Haoues, M. Secure Global Software Development: A Practitioners’ Perspective. Appl. Sci. 2023, 13, 2465. [Google Scholar] [CrossRef]
- Ilyas, M.; Khan, S.U.; Khan, H.U.; Rashid, N. Software integration model: An assessment tool for global software development vendors. J. Software: Evol. Process. 2023, 36. [Google Scholar] [CrossRef]
- Kitchenham, B. and S.L. Pfleeger, Principles of survey research part 6: data analysis. SIGSOFT Softw. Eng. Notes, 2003. 28(2): p. 24–27.
- Zadeh, L.A. , Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems. Advances in Fuzzy Systems — Applications and Theory, 1996. 6: p. 1-840.
- Marimon, F., M. Casadesus, and I. Heras-Saizarbitoria, ISO 9000 and ISO 14000 standards: An international diffusion model. International Journal of Operations & Production Management, 2006. 26: p. 141-165.
- Ayhan, M. , A Fuzzy AHP Approach for Supplier Selection Problem: A Case Study in a Gear Motor Company. International Journal of Managing Value and Supply Chains, 2013. 4.
- Chamodrakas, I.; Batis, D.; Martakos, D. Supplier selection in electronic marketplaces using satisficing and fuzzy AHP. Expert Syst. Appl. 2009, 37, 490–498. [Google Scholar] [CrossRef]
- Chang, D.-Y. Applications of the extent analysis method on fuzzy AHP. Eur. J. Oper. Res. 1996, 95, 649–655. [Google Scholar] [CrossRef]
- Stelzer, D. and W. Mellis, Success factors of organizational change in software process improvement. Software Process: Improvement and Practice, 1998. 4(4): p. 227-250.
- Corbin, J.M.; Strauss, A. Grounded Theory Research—Procedures, Canons and Evaluative Criteria. Qual. Sociol. 1990, 13, 3–21. [Google Scholar] [CrossRef]
- Khan, A.A.; Shameem, M.; Nadeem, M.; Akbar, M.A. Agile trends in Chinese global software development industry: Fuzzy AHP based conceptual mapping. Appl. Soft Comput. 2021, 102, 107090. [Google Scholar] [CrossRef]
- Khan, R.A. , et al., Security risks of global software development life cycle: Industry practitioner's perspective. Journal of Software: Evolution and Process, 2023. n/a(n/a): p. e2521.
- Khan, R.A.; Idris, M.Y.; Khan, S.U.; Ilyas, M.; Ali, S.; Din, A.U.; Murtaza, G.; Khan, A.W.; Jan, S.U. An Evaluation Framework for Communication and Coordination Processes in Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods. IEEE Access 2019, 7, 112879–112906. [Google Scholar] [CrossRef]
- Yaghoobi, T. Prioritizing key success factors of software projects using fuzzy AHP. J. Software: Evol. Process. 2017, 30. [Google Scholar] [CrossRef]
- K. Barbara, B. D. K. Barbara, B. D. Budgen, and O.P. Brereton, Using mapping studies as the basis for further research A participant-observer case study. Information Software Technology, 2011. 53(6): p. 638-651.
- Admass, W.S.; Munaye, Y.Y.; Diro, A.A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2024, 2. [Google Scholar] [CrossRef]
- Li, B.; Zhou, Q.; Cao, Y.; Si, X. Cognitively reconfigurable mimic-based heterogeneous password recovery system. Comput. Secur. 2022, 116, 102667. [Google Scholar] [CrossRef]









| Operation Laws | Expression |
| Addition (F1F2) | (1, 1, 1) (2, 2, 2) = (1 + 2, 1 + 2, 1 + 2) |
| Subtraction (F1F2) | (1, 1, 1) (2, 2, 2) = (1 - 2, 1 - 2, 1 - 2) |
| Multiplication (F1F2) | (1, 1, 1) (2, 2, 2) = (1 * 2, 1 * 2, 1 * 2) |
| Division (F1F2) | (1, 1, 1) (2, 2, 2) = (1 / 2, 1 / 2, 1 / 2) |
| Inverse (F1F2) | (1, 1, 1) -1 = (1, 1, 1) |
| For any real number k (Kf1) | k (1, 1, 1) = 1, 1, 1 |
| Matrix size | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
| RI | 0 | 0 | 0.58 | 0.9 | 1.12 | 1.24 | 1.32 | 1.41 | 1.45 | 1.49 |
| Human Success Factors (HSFs) | Description | Human Security Vulnerabilities (HSVs) | Description | ||
|---|---|---|---|---|---|
| HSF1: Skill and Expertise | Technical Proficiency: The team must possess strong technical skills in software development, cybersecurity principles, and secure coding practices. Expertise in using security tools and technologies is also crucial. | Continuous Learning: Encourage constant learning and professional development to keep team members updated with the latest threats, vulnerabilities, and mitigation techniques. | HSV1: Lack of Security Awareness and Training | Insufficient Knowledge: Developers and other team members who lack proper training in secure coding practice and Cybersecurity principles are more likely to introduce vulnerabilities into the software. | Outdated Knowledge: Not staying updated with the latest security threats, trends, and best practices can result in obsolete and insecure methods. |
| HSF2: Awareness and Mindset | Security Awareness: Every team member, from developers to project managers, should know the importance of security in the SDLC. Regular training and awareness programs can help reinforce this mindset. | Security-First Mindset: Cultivating a security-first mindset means prioritizing security considerations in every phase of the SDLC. This involves integrating security practices into the development process rather than the team treating them as an afterthought. | HSV2: Poor Communication and Collaboration | Miscommunication: Inadequate communication between team members, especially between developers and security experts, can lead to misunderstandings and overlooked security requirements. | Siloed Teams: Lack of collaboration between teams (development security, QA, operations) can result in incomplete security reviews and unaddressed vulnerabilities. |
| HSF3: Communication and Collaboration | Effective Communication: Clear and open communication channels within the team and with stakeholders are essential. This ensures that security requirements, risks, and mitigation strategies are well understood and properly implemented. | Collaboration: Cross-functional collaboration between developers, security experts, quality assurance teams, and operations staff is crucial. Collaborative efforts help identify potential security issues early and address them efficiently. | HSV3: Inadequate Testing and Review | Insufficient Security Testing: Failing to perform comprehensive security testing, such as static code analysis, dynamic testing, and penetration testing, can leave vulnerabilities undetected. | Lack of Peer Reviews: Skipping code reviews or conducting superficial reviews can allow security flaws to persist in the codebase. |
| HSF4: Leadership and Management | Supportive Leadership: Leaders and managers should support and advocate for secure development practices. This includes allocating necessary resources, providing training opportunities, and emphasizing the importance of security in project goals. | Risk Management: Effective leadership involves identifying, assessing, and managing security risks throughout the project. Proactive risk management helps mitigate potential threats before they become critical issues. | HSV4: Pressure and Workload | Time Constraints: Tight deadlines and high workload pressures can lead to cutting corners, skipping security checks, and hastily implementing code that may contain vulnerabilities. | Burnout: Overworked and fatigued developers are more prone to making mistakes and overlooking critical security. |
| HSF5: Process and Methodology | Defined Processes: Establishing well-defined processes and methodologies for SSD, such as Secure Development Lifecycle (SDL) or DevSecOps, helps ensure that security practices are systematically followed. | Compliance and Standards: Adhering to industry standards and regulatory requirements, such as ISO/IEC 27001, NIST, or GDPR, ensures that security practices are aligned with best practices and legal obligations. | HSV5: Unclear Roles and Responsibilities | Ambiguous Accountability: When security responsibilities are unclear, important security tasks may be neglected or assumed to be someone else’s responsibility. | Lack of Ownership: Without clear ownership of security tasks, there may be a lack of accountability and commitment to secure coding practices. |
| HSF6: Culture and Environment | Security Culture: Building a security-centric culture within the organization promotes vigilance and accountability. A strong security culture encourages team members to identify and address security concerns proactively. | Psychological Safety: Creating an environment where team members feel safe to report security issues without fear of blame or retribution fosters openness and prompt resolution of potential vulnerabilities. | HSV6: Resistance to Change | Inertia: Resistance to adopting new security tools, practices, or frameworks due to comfort with existing methods can hinder the implementation of more secure practices. | Fear of Disruption: Concerns about disrupting existing workflows or delaying projects can lead to resistance against integrating security measures into the development process. |
| HSF7: Accountability and Responsibility | Clear Roles and Responsibilities: Clearly define responsibilities related to security within the team to ensure that everyone knows their part in maintaining and enhancing software security. | Ownership: Encouraging team members to take ownership of their work and its security implications leads to higher quality and more SSD outcomes. | HSV7: Insufficient Resources | Limited Budget: Inadequate funding for security training, tools, and resources can prevent the adoption necessary security measures. | Lack of Access to Expertise: Not having access to experienced security professionals for guidance and support can leave security gaps unaddressed. |
| HSF8: Resource Allocation | Adequate Resources: Providing sufficient resources, including time, budget, and tools, is essential for implementing and maintaining SSD practices. | Access to Expertise: Ensuring access to security experts, whether in-house or through external consultants, helps address complex security challenges effectively. | HSV8: Human Error | Coding Mistakes: Simple coding errors, such as improper input validation, hardcoded credentials, or incorrect configurations, can introduce significant vulnerabilities. | Configuration Errors: Misconfigurations in development environments, servers, and applications can create exploitable security gaps. |
| HSF9: Testing and Validation | Comprehensive Testing: Regular and thorough security testing, including code reviews, penetrating testing, and vulnerability assessments, helps identify and rectify security weaknesses. | Feedback Loops: Establishing feedback loops for continuous improvement ensures that lessons learned from past projects are applied to future endeavors, enhancing overall security practices. | HSV9: Neglecting Secure Development Lifecycle | Inconsistent Processes: Failing to adhere to a standardized, secure development lifecycle (SDL) can result in inconsistent application of security practices and unaddressed vulnerabilities. | Ignoring Best Practices: Not following established best practices for secure development can introduce common vulnerabilities. |
| HSF10: Incident Response and Recovery | Preparedness: A well-defined incident response plan ensures the team is prepared to handle security breaches effectively. This includes identifying, responding to, and recovering from security incidents. | Learning from Incidents: Analyzing and learning from security incidents helps improve security measures and prevent future occurrences. | HSV10: Cultural Issues | Lack of Security Culture: An organizational culture that does not prioritize security or view it as everyone’s responsibility can lead to neglect of security practices. | Blame Culture: A culture that penalizes individuals for reporting security issues can discourage team members from identifying and addressing vulnerabilities. |
| HSF11: Scalability and Flexibility | Adaptable Integration: Ensuring that secure development practices can be integrated into various healthcare settings, from small clinics to large hospitals, and tailored to meet specific needs. | Scalable Solution: Develop solutions that can scale up to handle increased volumes of interactions and data while maintaining security standards. | HSV11: Insufficient Incident Response Preparedness | Lack of Preparedness: Inadequate incident response planning and training can result in poor handling of security incidents, leading to prolonged exposure to vulnerabilities. | Failure to learn from Incident: Not analyzing and learning from past security incidents can result in recurring vulnerabilities and security breaches. |
| HSF12: Ethical and Cultural Sensitivity | Ethical Considerations: Addressing ethical considerations comprehensively ensures patient confidentiality, informed consent, and equitable access to new interventions. | Cultural Sensitivity: Recognizing and respecting cultural differences in healthcare practices and patient expectations enhances acceptance and effectiveness of secure software. | HSV12: Over-Reliance and Tools | Tool Dependency: Relying too heavily on automated security tools without human oversight can lead to missed vulnerabilities that require contextual understanding and manual intervention. | False Sense of Security: Assuming that using security tools alone is sufficient can lead to complacency and underestimation of the need for thorough security practices. |
| HSFs | Literature | Real-World Industries | Similarities | Differences |
|---|---|---|---|---|
| HSF1: Skill and Expertise | Emphasizes the need for technical proficiency and continuous learning | Highlights the importance of training and identifying skill gaps in practical scenarios | Both stress the importance of technical skills and ongoing education | The literature review focuses more on the ideal skill sets and continuous learning, while surveys highlight real-world skill deficiencies |
| HSF2: Awareness and Mindset | Stress the importance of security awareness and a security-first mindset throughout the SDLC. | Indicates a lack of security awareness as a common issue among practitioners | Both emphasize the critical role of awareness and mindset in ensuring security. | Literature review emphasizes theoretical importance, while surveys highlight practical shortcomings in awareness and mindset. |
| HSF3: Communication and Collaboration | Highlights the importance of clear communication and cross-functional collaboration | Identifies poor communication and collaboration as significant issues impacting security | Both recognize that effective communication and collaboration are essential for security. | The literature review discusses ideal communication strategies, while surveys focus on practical communication breakdowns. |
| HSF4: Leadership and Management | Discusses the role of supportive leadership and proactive risk management | Often highlights a lack of clear leadership and accountability in practice | Both agree on the importance of solid leadership and management in promoting security | The literature review provides theoretical frameworks for leadership, while surveys offer specific examples of leadership deficiencies |
| HSF5: Process and Methodology | Advocates for defined processes and adherence to secure development lifecycles | Points out the neglect of secure development lifecycles and methodologies in practice | Both stress the necessity of structured processes and methodologies for security. | The literature review focuses on ideal processes, while the survey highlights the practical neglect of these processes. |
| HSF6: Culture and Environment | Emphasizes the need for a security-centric culture and supportive environment | Identifies cultural issues and resistance to change as significant barriers to security | Both recognize the influence of organizational culture on security practices. | The literature review discusses theoretical and cultural frameworks, while surveys address specific organizational cultural challenges. |
| HSF7: Accountability and Responsibility | Stresses the importance of clear roles and responsibilities in maintaining security | Highlights the impact of unclear roles and responsibilities on security practices in real-world scenarios | Both emphasize the need for clear accountability to ensure security | A literature review may discuss theoretical role definition, while surveys highlight real-world ambiguities and their impact on security |
| HSF8: Resource Allocation | Discusses the need for adequate resources, including time, budget, and tools, for secure development | Identifies insufficient resources as a common issue affecting security efforts | Both stress the importance of resource allocation for maintaining security | The literature review focuses on ideal resource allocation, while surveys highlight practical |
| HSF9: Testing and Validation | Advocates for thorough security testing and validation processes throughout the development lifecycle | Points out inadequate testing and review as significant vulnerabilities in practice | Both agree on the importance of comprehensive testing and validation | Literature review details ideal testing methodologies, while surveys reveal practical deficiencies in testing and validation efforts |
| HSF10: Incident Response and Recovery | Emphasizes the need for preparedness and learning from security incidents to improve future responses | Highlights insufficient incident response preparedness and real-world challenges in handling incidents | Both stress the importance of having robust incident response and recovery plans. | The literature review discusses theoretical incident response plans, while surveys highlight practical gaps and challenges in preparedness. |
| HSF11: Scalability and Flexibility | Discuss the need for adaptable and scalable security solutions that can grow with the organization. | Often implied in resource allocation and process flexibility but not always explicitly addressed. | Both recognize the need for scalability and flexibility in security practices. | The literature review explicitly addresses scalability and flexibility, while the survey focuses more on immediate practical concerns. |
| HSF12: Ethical and Cultural Sensitivity | Highlights the importance of ethical considerations and cultural sensitivity in SSD | Often implied in broader cultural issues and security awareness but not always explicitly addressed. | Both touch upon the importance of considering ethical and cultural factors in security practices | Literature review explicitly addresses ethical and cultural frameworks, while surveys focus on immediate practical concerns. |
| HSVs | Literature | Real-World Industries | Similarities | Differences |
|---|---|---|---|---|
| HSV1: Lack of Security Awareness and Training | Emphasizes the importance of continuous education and awareness programs | Highlights frequent security breaches due to sufficient knowledge | Both stress the need for awareness and training in security practices | Literature focuses on theoretical frameworks, while the real world highlights practical training gaps |
| HSV2: Poor Communication and Collaboration | Academic studies underline the importance of clear communication and collaboration. | Industries experience issues where a lack of collaboration leads to security gaps | Both recognize the importance of effective communication and collaboration | Literature provides ideal communication strategies, while the real world highlights practical communication issues |
| HSV3: Inadequate Testing and Review | Security vulnerabilities often arise from inadequate testing and review processes. | Time constraints and resource limitations result in rushed or incomplete testing. | Both stress the importance of comprehensive testing and validation | Literature details ideal testing methodologies, while the real world highlights practical deficiencies of testing efforts |
| HSV4: Unclear Roles and Responsibilities | Research identifies the need for clearly defined roles and responsibilities to avoid security issues. | Unclear responsibilities can lead to essential security tasks being overlooked or improperly executed. | Both agree on the importance of clearly defined roles and responsibilities in promoting security. | Literature provides theoretical frameworks for roles, while the real world highlights practical issues related to unclear roles. |
| HSV5: Insufficient Resources | Emphasizes the need for adequate resources, including budget, tools, and personnel | Budget constraints often lead to prioritizing other operational needs over security investments. | Both stress the importance of resource allocation for security | Literature focuses on ideal resource allocation, while the real world highlights practical resource constraints |
| HSV6: Human Error | Academic work acknowledges human error as a critical factor in security breaches. | Human error is a common cause of security incidents in industry reports | Both agree on the importance of addressing human error in security practices | Literature provides theoretical approaches, while the real world highlights practical human error issues |
| HSV7: Pressure and Workload | Less commonly highlighted compared to other vulnerabilities | High pressure and workload are frequently cited as major contributors to security lapses | Both recognize the impact of workload on security practices | Literature rarely addresses this as a standalone factor, while the world highlights it as a significant practical issue |
| HSV8: Resistance to Change | They are often discussed in a more theoretical context. | They are frequently a barrier to implementing new security measures and protocols. | Both acknowledge that resistance to change can impede security improvements. | The literature discusses it theoretically, while the world focuses on practical resistance issues. |
| HSV9: Neglecting Secure Software Development Lifecycle | Stresses the importance of incorporating security throughout the development lifecycle | They are often neglected due to cost, time constraints, or lack of immediate perceived benefits. | Both emphasize the necessity of including security in every development lifecycle phase. | Literature focuses on ideal processes, while the world highlights the practical neglect of secure development practices. |
| HSV10: Cultural Issues | Emphasizes the importance of a security-centric culture within organizations | Struggles to integrate security into core values and daily practices | Both recognize the influence of organizational culture on security practices | Literature provides theoretical and cultural frameworks, while the real world addresses specific cultural challenge |
| HSV11: Over-Reliance on Tools | Advocates for a balanced approach combining tools with human oversight | Often places excessive reliance on automated tools, underestimating the need for human judgment | Both highlight the risks of relying solely on automated tools for security | Literature focuses on balanced approaches, while the world highlights practical issues due to over-reliance on tools |
| Human Success Factors (HSFs) | Literature Review Impact % | Empirical Survey Impact % | Human Security Vulnerabilities (HSVs) | Literature Review Impact % | Impact Percentage |
| HSF1 | 94 | 90 | HSV1 | 90 | 91 |
| HSF2 | 91 | 85 | HSV2 | 89 | 85 |
| HSF3 | 86 | 81 | HSV3 | 78 | 84 |
| HSF4 | 82 | 79 | HSV4 | 75 | 82 |
| HSF5 | 79 | 78 | HSV5 | 69 | 78 |
| HSF6 | 78 | 76 | HSV6 | 68 | 66 |
| HSF7 | 75 | 73 | HSV7 | 64 | 60 |
| HSF8 | 73 | 72 | HSV8 | 56 | 59 |
| HSF9 | 71 | 70 | HSV9 | 50 | 52 |
| HSF10 | 63 | 60 | HSV10 | 47 | 49 |
| HSF11 | 60 | 52 | HSV11 | 45 | 43 |
| HSF12 | 55 | 50 | HSV12 | 44 | 40 |
| Practices for Addressing Human Success Factors | Sub-Practices | ||
|---|---|---|---|
| Security Training and Awareness | Regular Training: Provide ongoing security training to update the development team on the latest threats, secure coding practices, and regulatory requirements. | Security Champions: Identify and empower security champions within the team to advocate for and enforce security best practices. | Awareness Campaigns: Run regular security awareness campaigns to reinforce the importance of security in the development lifecycle. |
| Collaborative Culture | Team Collaboration: Foster a culture of collaboration where security is a shared responsibility across all team members, including developers, testers, and operations. | Cross-Functional Teams: Encourage forming cross-functional teams that include security experts to integrate security considerations into all stages of development. | Knowledge Sharing: Promote knowledge sharing through internal workshops, seminars, and collaborative tools. |
| Leadership and Management Support | Executive Support: Ensure strong support from leadership to prioritize security and allocate necessary resources. | Clear Vision: Communicate a clear vision and strategy for integrating security into the software development process. | Empowerment: Empower team members to take ownership of security practices and make decisions that enhance security. |
| Effective Communication | Open Channels: Establish open and effective communication channels to discuss security concerns and share updates. | Regular Meetings: Hold regular security-focused meetings to review potential vulnerabilities, share best practices, and update the team on new security threats. | Feedback Mechanisms: Implement feedback mechanisms to gather input from team members on security practices and improvement areas. |
| Skill Development | Continuous Learning: Encourage continuous learning and professional development in security through certifications, courses, and conferences. | Mentorship Programs: Implement mentorship programs where experienced security professionals guide less experienced team members. | Hands-On Practice: Provide opportunities for hands-on practice with secure coding, threat modeling, and penetration testing. |
| User-Centric Security | User Involvement: To understand their security concerns and expectations, involve end-users early in the development process. | User Feedback: Collect and act on user feedback regarding security features and usability. | Usability Testing: Conduct usability testing focusing on security features to ensure they are user-friendly and effective. |
| Agile and DevSecOps Practices | Agile Security Integration: Integrate security practices into Agile workflows to ensure continuous attention to security. | DevSecOps: Adopt DevSecOps practices to automate security testing and integrate security into the CI/CD pipeline. | Security Retrospectives: Conduct regular security retrospectives to review security incidents, identify lessons learned, and plan improvements. |
| Clear Roles and Responsibilities | Defined Roles: Clearly define roles and responsibilities related to security within the development team. | Role Flexibility: Allow role flexibility to adapt to changing security needs and leverage team members’ strengths. | Accountability: Ensure accountability for security practices and outcomes across all team members. |
| Stakeholder Engagement | Stakeholder Communication: Maintain regular communication with stakeholders to inform them about security measures and risks. | Expectation Management: Manage stakeholder expectations by being transparent about security risks and the measures in place to address them. | Stakeholder Involvement: Involve stakeholders in security planning and decision-making processes. |
| Risk Management | Risk Identification: Proactively identify potential security risks that could impact the project. | Mitigation Strategies: Develop and implement risk mitigation strategies to address identified security risks. | Incident Response Plans: Have incident response plans to address security breaches and quickly minimize impact. |
| Continuous Improvement | Performance Metrics: Use security performance metrics to assess security practices' effectiveness and identify areas for improvement. | Process Optimization: Continuously optimize security processes based on feedback and performance data. | Innovation Encouragement: Encourage innovation in security practices and use new tools and techniques to enhance security. |
| Practices for Addressing Human Security Vulnerabilities | Sub-Practices | ||
|---|---|---|---|
| Comprehensive Security Training and Awareness | Regular Training: Conduct regular training sessions to inform the development team about the latest security threats, secure coding practices, and compliance requirements. | Phishing Simulations: Implement phishing simulations to educate employees on recognizing and responding to phishing attacks. | Security Certifications: Encourage team members to obtain security certifications such as CISSP, CEH, or CSSLP. |
| Security Culture and Leadership | Security Champions: Designate security champions within development teams to promote security best practices and act as liaisons with the security team. | Leadership Commitment: Ensure that leadership demonstrates a commitment to security by prioritizing it in all aspects of the project. | Reward and Recognition: Recognize and reward team members who contribute to improving security within the project. |
| Effective Communication and Collaboration | Clear Communication Channels: Establish clear communication channels for reporting security issues and sharing security-related information | Cross-Functional Teams: Create cross-functional teams with security experts to integrate security considerations throughout the development lifecycle. | Regular Security Briefings: Hold regular security briefings to update the team on new threats and security incidents. |
| Access Control and Least Privilege | Role-Based Access Control (RBAC): Implement RBAC to ensure that team members have access only to the resources they need to perform their jobs. | Least Privilege Principle: Apply the principle of least privilege to minimize the potential impact of security breaches, | Multi-Factor Authentication (MFA): Use MFA to add extra security to critical systems and applications. |
| Secure Development Practices | Secure Coding Standards: Adopt and enforce secure coding standards (e.g., OWASP Secure Coding Practices) to prevent common vulnerabilities. | Code Review: Regular code reviews should focus on security to identify and address vulnerabilities early. | Static and Dynamic Analysis: Use static and dynamic analysis tools to detect security issues in the code. |
| Incident Response and Management | Incident Response Plan: Develop and maintain an incident response plan to quickly and effectively address security incidents. | Simulation Drills: Conduct regular incident response drills to ensure the team is prepared to handle security breaches. | Post-Incident Analysis: Perform post-incident analysis to learn from security incidents and improve future responses. |
| Continuous Monitoring and Testing | Vulnerability Scanning: Implement regular vulnerability scanning to identify and address security weaknesses. | Penetration Testing: Conduct penetration testing to simulate attacks and evaluate the effectiveness of security measures. | Security Audits: Perform regular security audits to ensure compliance with security policies and standards. |
| Data Protection and Privacy | Encryption: Use encryption to protect sensitive data both at rest and in transit. | Data Minimization: Collect and retain only the data necessary for the project to reduce the risk of data breaches. | Privacy by Design: Incorporate privacy considerations into the design and development of software to protect user data. |
| Supply Chain Security | Third-Party Risk Management: Assess and manage the security risks associated with third-party vendors and partners. | Secure Supply Chain: Implement security measures to protect the software supply chain, including code signing and verification. | Contractual Security Requirement: Include security requirements in contracts with third-party vendors to ensure they adhere to security best practices. |
| User Education and Support | Security Awareness for Users: Educate users about security best practices and how to recognize potential threats. | User-Friendly Security Features: Design security features that are user-friendly and encourage proper security behaviors. | Support Channels: Provide clear support channels for users to report security concerns and get help with security-related issues. |
| Regulatory Compliance and Standards | Compliance Programs: Establish compliance programs to adhere to relevant security regulations and standards (e.g., GDPR, HIPAA). | Regular Audits: Conduct regular audits to ensure ongoing compliance with security regulations and standards. | Documentation: Maintain thorough documentation of security policies, procedures, and compliance efforts. |
| HSFs and HSVs: Practices Categories | HSFs and HSVs: Practices Subcategories |
|---|---|
| C1: Security Training and Awareness | P1: Regular Training and Phishing Simulations P2: Security and Awareness Campaigns P3: Security Certifications and Support Channels P4: User-Friendly Security Features |
| C2: Collaborative Security Culture and Leadership | P5: Team Collaboration and Cross-Functional Teams P6: Knowledge Sharing and Executive Support P7: Leadership Commitment P8: Reward and Recognition P9: Clear Vision and Empowerment |
| C3: Effective Communication and Collaboration | P10: Open Channels and Regular Meetings P11: Feedback Mechanisms P12: Clear Communication Channels P13: Regular Security Briefings |
| C4: Skill Development and Stakeholder Engagement | P14: Continuous Learning and Mentorship Programs P15: Hands-On Practice and Stakeholder Communication P16: Expectation Management and Stakeholder Involvement |
| C5: Agile and DevSecOps Practices | P17: Agile Security Integration and DevSecOps P18: Security Retrospectives P19: Secure Coding Standards P20: Code Review, Static and Dynamic Analysis |
| C6: User-Centric Security, Clear Roles and Responsibilities | P21: Defined Roles and Role Flexibility P22: Accountability and Usability Testing P23: User Involvement and User Feedback |
| C7: Supply Chain Security and Risk Management | P24: Risk Identification and Mitigation Strategies P25: Incident Response Plans and Post-Incident Analysis P26: Simulation Drills P27: Third-Party Risk Management P28: Secure Supply Chain and Contractual Security |
| C8: Continuous Improvement, Monitoring and Testing | P29: Performance Metrics and Process Optimization P30: Innovation Encouragement and Compliance Programs P31: Vulnerability Scanning and Penetration Testing P32: Security and Regular Audits P33: Documentation |
| C9: Data Protection and Privacy, Access Control and Least Privilege | P34: Role-Based Access Control (RBAC) P35: Least Privilege Principle P36: Multi-Factor Authentication (MFA) P37: Encryption and Data Minimization P38: Privacy by Design |

| Categories | C-1 | C-2 | C-3 | C-4 | C-5 | C-6 | C-7 | C-8 | C-9 | Sum | Sum * Inverse of the total sum of the columns |
| C-1 | (1, 1, 1) | (0.4, 0.5, 0.6) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | (0.5, 0.6, 1) | (0.5, 1, 1.5) | (0.6, 1, 2) | (0.6, 1, 2) | (0.5, 0.6, 1) | (5.1, 7.7, 12.1) | (0.0392, 0.0893, 0.2008) |
| C-2 | (1.5, 2, 2.5) | (1, 1, 1) | (0.5, 1, 1.5) | (0.4, 0.5, 0.6) | (0.5, 1, 1.5) | (1, 1.5, 2) | (0.5, 0.6, 1) | (0.5, 0.6, 1) | (1, 1.5, 2) | (7.4, 9.7, 13.1) | (0.0569, 0.1125, 0.2174) |
| C-3 | (0.6, 1, 2) | (0.6, 1, 2) | (1, 1, 1) | (1, 1.5, 2) | (1.5, 2, 2.5) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | (1.5, 2, 2.5) | (0.6, 1, 2) | (7.8, 11.5, 17) | (0.0600, 0.1334, 0.2822) |
| C-4 | (0.6, 1, 2) | (1.5, 2, 2.5) | (0.5, 0.6, 1) | (1, 1, 1) | (0.5, 1, 1.5) | (1.5, 2, 2.5) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | (7.1, 10.6, 15) | (0.0546, 0.1229, 0.2490) |
| C-5 | (1, 1.5, 2) | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (0.6, 1, 2) | (1, 1, 1) | (0.6, 1, 2) | (0.5, 0.6, 1) | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (5.7, 8.1, 16.2) | (0.0438, 0.0939, 0.2689) |
| C-6 | (0.6, 1, 2) | (0.5, 0.6, 1) | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (0.5, 1, 1.5) | (1, 1, 1) | (1, 1.5, 2) | (1, 1.5, 2) | (1.5, 2, 2.5) | (7.1, 10.1, 14.6) | (0.0546, 0.1171, 0.2423) |
| C-7 | (0.5, 1, 1.5) | (1, 1.5, 2) | (0.6, 1, 2) | (0.6, 1, 2) | (1, 1.5, 2) | (0.5, 0.6, 1) | (1, 1, 1) | (0.5, 0.6, 1) | (0.5, 0.6, 1) | (6.2, 8.8, 13.5) | (0.0477, 0.1020, 0.2241) |
| C-8 | (0.5, 1, 1.5) | (1, 1.5, 2) | (0.4, 0.5, 0.6) | (0.6, 1, 2) | (0.5, 1, 1.5) | (0.5, 0.6, 1) | (1, 1.5, 2) | (1, 1, 1) | (1, 1.5, 2) | (6.5, 9.6, 13.6) | (0.0500, 0.1113, 0.2257) |
| C-9 | (1, 1.5, 2) | (0.5, 0.6, 1) | (0.5, 1, 1.5) | (0.6, 1, 2) | (1.5, 2, 2.5) | (0.4, 0.5, 0.6) | (1, 1.5, 2) | (0.5, 0.6, 1) | (1, 1, 1) | (7, 9.7, 13.6) | (0.0539, 0.1125, 0.2257) |
| The total sum of the columns | (59.9, 85.8, 128.7) | ||||||||||
| The inverse of the total sum of the columns | (0.0077, 0.0116, 0.0166) | ||||||||||
| Categories | C-1 | C-2 | C-3 | C-4 | C-5 | C-6 | C-7 | C-8 | C-9 |
| C-1 | 1 | 0.5 | 1 | 1 | 0.61 | 1 | 1 | 1 | 0.61 |
| C-2 | 2 | 1 | 1 | 0.5 | 1 | 1.5 | 0.61 | 0.61 | 1.5 |
| C-3 | 1 | 1 | 1 | 1.5 | 2 | 1 | 1 | 2 | 0.61 |
| C-4 | 1 | 2 | 0.61 | 1 | 1 | 2 | 1 | 1 | 1 |
| C-5 | 1.5 | 1 | 0.5 | 1 | 1 | 1 | 0.61 | 1 | 0.5 |
| C-6 | 1 | 0.61 | 1 | 0.5 | 1 | 1 | 1.5 | 1.5 | 2 |
| C-7 | 1 | 1.5 | 1 | 1 | 1.5 | 0.61 | 1 | 0.61 | 0.61 |
| C-8 | 1 | 1.5 | 0.5 | 1 | 1 | 0.61 | 1.5 | 1 | 1.5 |
| C-9 | 1.5 | 0.61 | 1 | 1 | 2 | 0.5 | 1.5 | 0.61 | 1 |
| Sum | 11 | 9.72 | 7.61 | 8.5 | 11.11 | 9.2 | 9.72 | 9.33 | 9.32 |
| Categories | Sum * Inverse of the total sum of the columns | C-1 | C-2 | C-3 | C-4 | C-5 | C-6 | C-7 | C-8 | C-9 | Priority Weight |
| V (C1≥…) | (0.0392, 0.0893, 0.2008)(l1, m1, u1) | - | 0.6625 | 0.5991 | 0.6359 | 0.7416 | 0.6523 | 0.7091 | 0.6765 | 0.6671 | 0.5991 |
| V (C2≥…) | (0.0569, 0.1125, 0.2174)(l2, m2, u2) | 1 | - | 0.8827 | 0.9399 | 1 | 0.9725 | 1 | 1 | 1 | 0.8827 |
| V (C3≥…) | (0.0600, 0.1334, 0.2822)(l3, m3, u3) | 1 | 1 | - | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
| V (C4≥…) | (0.0546, 0.1229, 0.2490)(l4, m4, u4) | 1 | 1 | 0.9473 | - | 1 | 1 | 1 | 1 | 1 | 0.9473 |
| V (C5≥…) | (0.0438, 0.0939, 0.2689)(l5, m5, u5) | 1 | 0.9193 | 0.8409 | 0.8808 | - | 0.9023 | 0.9646 | 0.9263 | 0.9203 | 0.8409 |
| V (C6≥…) | (0.0546, 0.1171, 0.2423)(l6, m6, u6) | 1 | 1 | 0.9179 | 0.9700 | 1 | - | 1 | 1 | 1 | 0.9179 |
| V (C7≥…) | (0.0477, 0.1020, 0.2241)(l7, m7, u7) | 1 | 0.9409 | 0.8393 | 0.8902 | 1 | 0.9182 | - | 0.9492 | 0.9418 | 0.8393 |
| V (C8≥…) | (0.0500, 0.1113, 0.2257)(l8, m8, u8) | 1 | 0.9929 | 0.8823 | 0.9365 | 1 | 0.9672 | 1 | - | 0.9930 | 0.8823 |
| V (C9≥…) | (0.0539, 0.1125, 0.2257)(l9, m9, u9) | 1 | 1 | 0.8879 | 0.9427 | 1 | 0.9738 | 1 | 1 | - | 0.8879 |
| Categories | C-1 | C-2 | C-3 | C-4 | C-5 | C-6 | C-7 | C-8 | C-9 | W |
| C-1 | 0.09090 | 0.05144 | 0.13140 | 0.11764 | 0.05490 | 0.10869 | 0.10288 | 0.10718 | 0.06545 | 0.09227 |
| C-2 | 0.18181 | 0.10288 | 0.13140 | 0.05882 | 0.09000 | 0.16304 | 0.06275 | 0.06538 | 0.16094 | 0.11300 |
| C-3 | 0.09090 | 0.10288 | 0.13140 | 0.05882 | 0.18001 | 0.10869 | 0.10288 | 0.21436 | 0.06545 | 0.11726 |
| C-4 | 0.09090 | 0.20576 | 0.08015 | 0.11764 | 0.09000 | 0.21739 | 0.10288 | 0.10718 | 0.10729 | 0.12435 |
| C-5 | 0.13636 | 0.10288 | 0.06570 | 0.11764 | 0.09000 | 0.10869 | 0.06275 | 0.10718 | 0.05364 | 0.09387 |
| C-6 | 0.09090 | 0.06275 | 0.13140 | 0.05882 | 0.09000 | 0.10869 | 0.06275 | 0.16077 | 0.21459 | 0.10896 |
| C-7 | 0.09090 | 0.15432 | 0.13140 | 0.11764 | 0.13501 | 0.06630 | 0.10288 | 0.06538 | 0.06545 | 0.10325 |
| C-8 | 0.09090 | 0.15432 | 0.06570 | 0.11764 | 0.09000 | 0.06630 | 0.15432 | 0.10718 | 0.16094 | 0.11922 |
| C-9 | 0.13636 | 0.06275 | 0.13140 | 0.11764 | 0.18001 | 0.05434 | 0.15432 | 0.06538 | 0.10729 | 0.11216 |
| C-1 | P-1 | P-2 | P-3 | P-4 | Weight |
| P-1 | (1, 1, 1) | (0.5, 1, 1.5) | (0.5, 0.6, 1) | (1, 1.5, 2) | 0.2478 |
| P-2 | (0.6, 1, 2) | (1, 1, 1) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | 0.2447 |
| P-3 | (1, 1.5, 2) | (0.6, 1, 2) | (1, 1, 1) | (0.5, 0.6, 1) | 0.2531 |
| P-4 | (0.5, 0.6, 1) | (0.6, 1, 2) | (1, 1.5, 2) | (1, 1, 1) | 0.2543 |
| C-2 | P-5 | P-6 | P-7 | P-8 | P-9 | Weight |
| P-5 | (1, 1, 1) | (0.5, 0.6, 1) | (2, 2.5, 3) | (0.5, 0.6, 1) | (2.5, 3, 3.5) | 0.2727 |
| P-6 | (1, 1.5, 2) | (1, 1, 1) | (1, 1.5, 2) | (0.5, 1, 1.5) | (0.4, 0.5, 0.6) | 0.1764 |
| P-7 | (0.3, 0.4, 0.5) | (0.5, 0.6, 1) | (1, 1, 1) | (2.5, 3, 3.5) | (0.5, 1, 1.5) | 0.1985 |
| P-8 | (1, 1.5, 2) | (0.6, 1, 2) | (0.2, 0.3, 0.4) | (1, 1, 1) | (0.3, 0.4, 0.5) | 0.1134 |
| P-9 | (0.2, 0.3, 0.4) | (1.5, 2, 2.5) | (0.6, 1, 2) | (2, 2.5, 3) | (1, 1, 1) | 0.2388 |
| C-3 | P-10 | P-11 | P-12 | P-13 | Weight |
| P-10 | (1, 1, 1) | (0.2, 0.3, 0.4) | (1, 1.5, 2) | (1.5, 2, 2.5) | 0.2588 |
| P-11 | (2.5, 3, 3.5) | (1, 1, 1) | (0.4, 0.5, 0.6) | (0.5, 1, 1.5) | 0.3038 |
| P-12 | (0.5, 0.6, 1) | (1.5, 2, 2.5) | (1, 1, 1) | (0.5, 0.6, 1) | 0.2219 |
| P-13 | (0.4, 0.5, 0.6) | (0.6, 1, 2) | (1, 1.5, 2) | (1, 1, 1) | 0.2153 |
| C-4 | P-14 | P-15 | P-16 | Weight |
| P-14 | (1, 1, 1) | (0.4, 0.5, 0.6) | (0.5, 1, 1.5) | 0.2554 |
| P-15 | (1.5, 2, 2.5) | (1, 1, 1) | (0.6, 1, 2) | 0.4142 |
| P-16 | (0.6, 1, 2) | (0.5, 1, 1.5) | (1, 1, 1) | 0.3302 |
| C-5 | P-17 | P-18 | P-19 | P-20 | Weight |
| P-17 | (1, 1, 1) | (1.5, 2, 2.5) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | 0.2902 |
| P-18 | (0.4, 0.5, 0.6) | (1, 1, 1) | (0.5, 1, 1.5) | (1.5, 2, 2.5) | 0.2475 |
| P-19 | (0.6, 1, 2) | (0.6, 1, 2) | (1, 1, 1) | (1, 1.5, 2) | 0.2707 |
| P-20 | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (0.5, 0.6, 1) | (1, 1, 1) | 0.1914 |
| C-6 | P-21 | P-22 | P-23 | Weight |
| P-21 | (1, 1, 1) | (0.4, 0.5, 0.6) | (1, 1.5, 2) | 0.2868 |
| P-22 | (1.5, 2, 2.5) | (1, 1, 1) | (0.6, 1, 2) | 0.3978 |
| P-23 | (0.5, 0.6, 1) | (0.5, 1, 1.5) | (1, 1, 1) | 0.3153 |
| C-7 | P-24 | P-25 | P-26 | P-27 | P-28 | Weight |
| P-24 | (1, 1, 1) | (0.5, 1, 1.5) | (0.6, 1, 2) | (1, 1.5, 2) | (0.5, 0.6, 1) | 0.1964 |
| P-25 | (0.6, 1, 2) | (1, 1, 1) | (1.5, 2, 2.5) | (0.4, 0.5, 0.6) | (2, 2.5, 3) | 0.2373 |
| P-26 | (0.5, 1, 1.5) | (0.4, 0.5, 0.6) | (1, 1, 1) | (0.3, 0.4, 0.5) | (0.5, 1, 1.5) | 0.1346 |
| P-27 | (0.5, 0.6, 1) | (1.5, 2, 2.5) | (2, 2.5, 3) | (1, 1, 1) | (0.6, 1, 2) | 0.2519 |
| P-28 | (1, 1.5, 2) | (0.3, 0.4, 0.5) | (0.6, 1, 2) | (0.5, 1, 1.5) | (1, 1, 1) | 0.1794 |
| C-8 | P-29 | P-30 | P-31 | P-32 | P-33 | Weight |
| P-29 | (1, 1, 1) | (1.5, 2, 2.5) | (0.5, 1, 1.5) | (0.5, 1, 1.5) | (1, 1.5, 2) | 0.2379 |
| P-30 | (0.4, 0.5, 0.6) | (1, 1, 1) | (0.5, 1, 1.5) | (1.5, 2, 2.5) | (0.5, 1, 1.5) | 0.1887 |
| P-31 | (0.6, 1, 2) | (0.6, 1, 2) | (1, 1, 1) | (1, 1.5, 2) | (1.5, 2, 2.5) | 0.2376 |
| P-32 | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (0.5, 0.6, 1) | (1, 1, 1) | (0.5, 1, 1.5) | 0.1652 |
| P-33 | (0.5, 0.6, 1) | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (0.6, 1, 2) | (1, 1, 1) | 0.1701 |
| C-9 | P-34 | P-35 | P-36 | P-37 | P-38 | Weight |
| P-34 | (1, 1, 1) | (2, 2.5, 3) | (0.4, 0.5, 0.6) | (0.6, 1, 2) | (1, 1.5, 2) | 0.2308 |
| P-35 | (0.3, 0.4, 0.5) | (1, 1, 1) | (2, 2.5, 3) | (1, 1.5, 2) | (0.4, 0.5, 0.6) | 0.1767 |
| P-36 | (1.5, 2, 2.5) | (0.3, 0.4, 0.5) | (1, 1, 1) | (2.5, 3, 3.5) | (0.5, 1, 1.5) | 0.2633 |
| P-37 | (0.5, 1, 1.5) | (0.5, 0.6, 1) | (0.2, 0.3, 0.4) | (1, 1, 1) | (1.5, 2, 2.5) | 0.1549 |
| P-38 | (0.5, 0.6, 1) | (1.5, 2, 2.5) | (0.6, 1, 2) | (0.4, 0.5, 0.6) | (1, 1, 1) | 0.1739 |
| Practices Categories for Addressing HSFs and HSVs that Impact SSD Project | Categories Weights | Sub-Practices | Local Weight | Local Rank | Global Weight | Global Rank |
|---|---|---|---|---|---|---|
| C1: Security Training and Awareness | 0.09227 | P1: Regular Training and Phishing Simulations | 0.2478 | 3 | 0.022865 | 24 |
| P2: Security and Awareness Campaigns | 0.2447 | 4 | 0.022578 | 25 | ||
| P3: Security Certifications and Support Channels | 0.2531 | 2 | 0.023354 | 22 | ||
| P4: User-Friendly Security Features | 0.2543 | 1 | 0.023464 | 21 | ||
| C2: Collaborative Security Culture and Leadership | 0.11300 | P5: Team Collaboration and Cross-Functional Teams | 0.2727 | 2 | 0.030815 | 8 |
| P6: Knowledge Sharing and Executive Support | 0.1764 | 4 | 0.019933 | 30 | ||
| P7: Leadership Commitment | 0.1985 | 3 | 0.022431 | 27 | ||
| P8: Reward and Recognition | 0.1134 | 5 | 0.012814 | 38 | ||
| P9: Clear Vision and Empowerment | 0.2388 | 1 | 0.026984 | 14 | ||
| C3: Effective Communication and Collaboration | 0.11726 | P10: Open Channels and Regular Meetings | 0.2588 | 2 | 0.030347 | 9 |
| P11: Feedback Mechanisms | 0.3038 | 1 | 0.035624 | 4 | ||
| P12: Clear Communication Channels | 0.2219 | 3 | 0.02602 | 15 | ||
| P13: Regular Security Briefings | 0.2153 | 4 | 0.025246 | 19 | ||
| C4: Skill Development and Stakeholder Engagement | 0.12435 | P14: Continuous Learning and Mentorship Programs | 0.2554 | 3 | 0.031759 | 6 |
| P15: Hands-On Practice and Stakeholder Communication | 0.4142 | 1 | 0.051506 | 1 | ||
| P16: Expectation Management and Stakeholder Involvement | 0.3302 | 2 | 0.04106 | 3 | ||
| C5: Agile and DevSecOps Practices | 0.09387 | P17: Agile Security Integration and DevSecOps | 0.2902 | 1 | 0.027241 | 13 |
| P18: Security Retrospectives | 0.2475 | 3 | 0.023233 | 23 | ||
| P19: Secure Coding Standards | 0.2707 | 2 | 0.025411 | 18 | ||
| P20: Code Review, Static and Dynamic Analysis | 0.1914 | 4 | 0.017967 | 35 | ||
| C6: User-Centric Security, Clear Roles and Responsibilities | 0.10896 | P21: Defined Roles and Role Flexibility | 0.2868 | 3 | 0.03125 | 7 |
| P22: Accountability and Usability Testing | 0.3978 | 1 | 0.043344 | 2 | ||
| P23: User Involvement and User Feedback | 0.3153 | 2 | 0.034355 | 5 | ||
| C7: Supply Chain Security and Risk Management | 0.10325 | P24: Risk Identification and Mitigation Strategies | 0.1964 | 3 | 0.020278 | 29 |
| P25: Incident Response Plans and Post-Incident Analysis | 0.2373 | 2 | 0.024501 | 20 | ||
| P26: Simulation Drills | 0.1346 | 5 | 0.013897 | 38 | ||
| P27: Third-Party Risk Management | 0.2519 | 1 | 0.026009 | 16 | ||
| P28: Secure Supply Chain and Contractual Security | 0.1794 | 4 | 0.018523 | 34 | ||
| C8: Continuous Improvement, Monitoring and Testing | 0.11922 | P29: Performance Metrics and Process Optimization | 0.2379 | 1 | 0.028362 | 11 |
| P30: Innovation Encouragement and Compliance Programs | 0.1887 | 3 | 0.022497 | 26 | ||
| P31: Vulnerability Scanning and Penetration Testing | 0.2376 | 2 | 0.028327 | 12 | ||
| P32: Security and Regular Audits | 0.1652 | 5 | 0.019695 | 32 | ||
| P33: Documentation | 0.1701 | 4 | 0.020279 | 28 | ||
| C9: Data Protection and Privacy, Access Control and Least Privilege | 0.11216 | P34: Role-Based Access Control (RBAC) | 0.2308 | 2 | 0.025887 | 17 |
| P35: Least Privilege Principle | 0.1767 | 3 | 0.019819 | 31 | ||
| P36: Multi-Factor Authentication (MFA) | 0.2633 | 1 | 0.029532 | 10 | ||
| P37: Encryption and Data Minimization | 0.1549 | 5 | 0.017374 | 36 | ||
| P38: Privacy by Design | 0.1739 | 4 | 0.019505 | 33 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
