{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T10:15:46Z","timestamp":1753870546463,"version":"3.41.2"},"reference-count":63,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T00:00:00Z","timestamp":1640217600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Security threats have increased in recent years. To motivate the developers to stick to the security policies, the notion of usable security is investigated. Enhancing the usability of security services leads to developing software products that are resilient against security threats. In this paper, we investigate the role of usable security in developers' intention toward fulfilling the security considerations through the development process. To study this, we conducted empirical research on 25 experts in the field of software development. We proposed a model for analyzing the research outcome using statistical inference based on an extension of the theory of planned behavior. In particular, we posit that attitude toward the development of usable services, subjective norms, and moral obligation are determinants of intention to develop usable security services. We developed 11 security services that are used in the development of service\u2010oriented software. We asked the experts to integrate the security services in the software and studied the integration process using a detailed questionnaire. The findings indicate a strong positive influence of all correlations, which describe developers' intentions to develop usable secure services to 52%. Our insights enhance the understanding of developers' intentions toward developing usable secure services and their fulfillment.<\/jats:p>","DOI":"10.1002\/spy2.199","type":"journal-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T22:04:44Z","timestamp":1640297084000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the role of usable security in developers' intention toward security enhancement in <scp>service\u2010oriented<\/scp> applications"],"prefix":"10.1002","volume":"5","author":[{"given":"Foad","family":"Jalali","sequence":"first","affiliation":[{"name":"Department of Computer Engineering Pooyesh Institute of Higher Education  Qom Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7274-9569","authenticated-orcid":false,"given":"Mehran","family":"Alidoost Nia","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, College of Engineering University of Tehran  Tehran Iran"}]},{"given":"Tatiana","family":"Ermakova","sequence":"additional","affiliation":[{"name":"Digitalisation and Networked Security Research Group Fraunhofer FOKUS &amp; Weizenbaum Institute for the Networked Society  Berlin Germany"}]},{"given":"Meisam","family":"Abdollahi","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Iran University of Science and Technology  Tehran Iran"}]},{"given":"Benjamin","family":"Fabian","sequence":"additional","affiliation":[{"name":"Department of Computer Science Technical University of Applied Sciences Wildau  Brandenburg Germany"}]}],"member":"311","published-online":{"date-parts":[[2021,12,23]]},"reference":[{"key":"e_1_2_14_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5409"},{"key":"e_1_2_14_3_1","doi-asserted-by":"crossref","unstructured":"HazeyamaA TanakaS TanakaT HashiuraH MunetohS OkuboT KaiyaH WashizakiH YoshiokaN.Security requirement modeling support system using software security Knowledge Base. Paper presented at: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC);2018:234\u2013239.","DOI":"10.1109\/COMPSAC.2018.10235"},{"key":"e_1_2_14_4_1","first-page":"22","article-title":"Developers need support, too: a survey of security advice for software developers","volume":"2017","author":"Acar Y","year":"2017","journal-title":"IEEE Cybersecurity Dev (SecDev)"},{"issue":"3","key":"e_1_2_14_5_1","first-page":"1","article-title":"System usability scale evaluation of online banking services: a south African study","volume":"114","author":"Mujinga M","year":"2018","journal-title":"S Afr J Sci"},{"key":"e_1_2_14_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524500420949220"},{"key":"e_1_2_14_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spc.2020.07.006"},{"key":"e_1_2_14_8_1","first-page":"519","article-title":"A model for evaluating the security and usability of e\u2010banking platforms","volume":"99","author":"Alarifi A","year":"2017","journal-title":"Comput Secur"},{"key":"e_1_2_14_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2019.03.018"},{"key":"e_1_2_14_10_1","unstructured":"Alidoost NiaM SajediA JamshidpeyA.An introduction to digital signature schemes. arXiv:14042820;2014.http:\/\/arxiv.org\/abs\/1404.2820"},{"key":"e_1_2_14_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.027"},{"key":"e_1_2_14_12_1","doi-asserted-by":"publisher","DOI":"10.2196\/formative.9954"},{"key":"e_1_2_14_13_1","doi-asserted-by":"publisher","DOI":"10.5964\/ejop.v16i3.3107"},{"key":"e_1_2_14_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2018.12.003"},{"key":"e_1_2_14_15_1","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2020.2.004"},{"key":"e_1_2_14_16_1","doi-asserted-by":"publisher","DOI":"10.4018\/JOEUC.2018100101"},{"issue":"6","key":"e_1_2_14_17_1","doi-asserted-by":"crossref","first-page":"e07248","DOI":"10.1016\/j.heliyon.2021.e07248","article-title":"Information security cultural differences among health care facilities in Indonesia","volume":"7","author":"KencanaSari P","year":"2021","journal-title":"Heliyon"},{"key":"e_1_2_14_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101646"},{"key":"e_1_2_14_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102354"},{"key":"e_1_2_14_20_1","article-title":"Taxonomy of cyber security metrics to measure strength of cyber security","author":"Bhol SG","year":"2021","journal-title":"Mater Today: Proc"},{"key":"e_1_2_14_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102345"},{"key":"e_1_2_14_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101491"},{"key":"e_1_2_14_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2017.01.021"},{"key":"e_1_2_14_24_1","doi-asserted-by":"crossref","unstructured":"Hasi\u0107F De SmedtJ VanthienenJ.A service\u2010oriented architecture design of decision\u2010aware information systems: decision as a service. Paper presented at: Proceeding of 2017 Conference on the Move to Meaningful Internet Systems (OTM 2017) Lecture Notes in Computer Science;2017 10573:353\u2013361.","DOI":"10.1007\/978-3-319-69462-7_23"},{"key":"e_1_2_14_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-02945-x"},{"key":"e_1_2_14_26_1","doi-asserted-by":"crossref","unstructured":"ZhangW QiQ DengJ.Building intelligent transportation cloud data center based on SOA. Research Anthology on Architectures Frameworks and Integration Strategies for Distributed and Cloud Computing Edited by Information Resources Management Association IGI Global;2021:1084\u20131096.","DOI":"10.4018\/978-1-7998-5339-8.ch050"},{"key":"e_1_2_14_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102340"},{"key":"e_1_2_14_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718801535"},{"key":"e_1_2_14_29_1","doi-asserted-by":"crossref","unstructured":"EthelbertO MoghaddamF WiederP YahyapourR.A JSON token\u2010based authentication and access management schema for cloud SaaS applications. Paper presented at: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud);2017:47\u201353.","DOI":"10.1109\/FiCloud.2017.29"},{"key":"e_1_2_14_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/su10072580"},{"key":"e_1_2_14_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_2_14_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970245"},{"key":"e_1_2_14_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39903-0_1619"},{"key":"e_1_2_14_34_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v16i4.8388"},{"key":"e_1_2_14_35_1","unstructured":"JalaliF NiaMA.Developing a usable secure service for integrating the JWT tokens into the service\u2010oriented projects;2021.https:\/\/github.com\/FoadJalali\/service\u2010oriented\u2010usable\u2010security"},{"key":"e_1_2_14_36_1","article-title":"Multi\u2010level fuzzy system for usable\u2010security assessment","author":"Agrawal A","year":"2019","journal-title":"J King Saud Univ \u2010 Comput Inf Sci"},{"key":"e_1_2_14_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_6"},{"key":"e_1_2_14_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.233"},{"key":"e_1_2_14_39_1","first-page":"102369","article-title":"Usable security for QR code","volume":"48","author":"Focardi R","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"e_1_2_14_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11165-016-9602-2"},{"key":"e_1_2_14_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101293"},{"key":"e_1_2_14_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajsl.2018.06.006"},{"key":"e_1_2_14_43_1","first-page":"63","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling","author":"Hair JF","year":"2014"},{"key":"e_1_2_14_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106275"},{"key":"e_1_2_14_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/01973533.2016.1277529"},{"key":"e_1_2_14_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-017-0584-6"},{"key":"e_1_2_14_47_1","unstructured":"AjzenI.Theory of planned behaviour questionnaire. Measurement Instrument Database for the Social Science;2013."},{"key":"e_1_2_14_48_1","first-page":"43","article-title":"Analysis of code refactoring impact on software quality: a scientific explanation","volume":"7","author":"Kaur A","year":"2021","journal-title":"Adv Aspects Eng Res"},{"key":"e_1_2_14_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.001"},{"key":"e_1_2_14_50_1","doi-asserted-by":"publisher","DOI":"10.5395\/rde.2017.42.2.152"},{"key":"e_1_2_14_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103700"},{"key":"e_1_2_14_52_1","doi-asserted-by":"publisher","DOI":"10.3390\/su11041155"},{"key":"e_1_2_14_53_1","unstructured":"GordieievO KharchenkoV VereshchakK.Usable Security Versus Secure Usability: An Assessment of Attributes Interaction ICTERI;2017."},{"key":"e_1_2_14_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102144"},{"key":"e_1_2_14_55_1","unstructured":"DawsonME WalkerD ClevelandS.The Case for IT Training within Guinea's Ministry of Agriculture: Evaluating Performance and Usability MWAIS;2018."},{"key":"e_1_2_14_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.195"},{"key":"e_1_2_14_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/2065853"},{"key":"e_1_2_14_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30107-1"},{"key":"e_1_2_14_59_1","doi-asserted-by":"crossref","unstructured":"TahaeiM VanieaK.A survey on developer\u2010centred security. Paper presented at: IEEE European Symposium on Security and Privacy Workshops (EuroS and PW);2019:129\u2013138.","DOI":"10.1109\/EuroSPW.2019.00021"},{"key":"e_1_2_14_60_1","doi-asserted-by":"crossref","unstructured":"PariziRM SinghA Dehghantanha.ASmart contract programming languages on blockchains: an empirical evaluation of usability and security. Paper presented at: International Conference on Blockchain;2018: 10974.","DOI":"10.1007\/978-3-319-94478-4_6"},{"key":"e_1_2_14_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2018.03.006"},{"key":"e_1_2_14_62_1","doi-asserted-by":"publisher","DOI":"10.17485\/IJST\/v13i26.848"},{"key":"e_1_2_14_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645667"},{"key":"e_1_2_14_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102241"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.199","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/spy2.199","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,27]],"date-time":"2023-08-27T07:34:57Z","timestamp":1693121697000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,23]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1002\/spy2.199"],"URL":"https:\/\/doi.org\/10.1002\/spy2.199","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2021,12,23]]},"assertion":[{"value":"2021-08-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e199"}}