Skip to main content

Measuring Self-efficacy in Secure Programming

  • Conference paper
  • First Online:
Information Security Education for Cyber Resilience (WISE 2021)

Abstract

Computing students are not receiving enough education and practice in secure programming. A key part of being able to successfully implement secure programming practices is the development of secure programming self-efficacy. This paper examines the development of a scale to measure secure programming self-efficacy among students participating in a secure programming clinic (SPC). The results show that the secure programming self-efficacy scale is a reliable and useful measure that correlates satisfactorily with related measures of programming expertise. This measure can be used in secure programming courses and other learning environments to assess students’ secure programming efficacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. CVE Database. https://cve.mitre.org. Accessed 15 Apr 2021

  2. Zetter, K.: Serious Error in Diebold Voting Software Caused Lost Ballots in California County—Update. Wired (2008)

    Google Scholar 

  3. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Security Symposium, USENIX Association, Berkeley, CA, USA (2011)

    Google Scholar 

  4. Weinberg, G.: The Psychology of Computer Programming. Van Nostrand Reinhold, New York (1971)

    Google Scholar 

  5. Bishop, M., Orvis, B.: A clinic to teach good programming practices. In: Proceedings of the 10th Colloquium on Information Systems Security Education, pp. 168–174 (2006)

    Google Scholar 

  6. Bishop, M.: A clinic for ‘secure’ programming. IEEE Secur. Priv. 8(2), 54–56 (2010)

    Article  Google Scholar 

  7. Dark, M., Stuart, L., Ngambeki, I., Bishop, M.: Effect of the secure programming clinic on learners’ secure programming practices. J. Colloq. Inf. Syst. Secur. Educ. 4(1) (2016)

    Google Scholar 

  8. Bishop, M., et al.: Learning principles and the secure programming clinic. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IFIP Advances in Information and Communication Technology IAICT, vol. 557, pp. 16–29. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-23451-5_2

    Chapter  Google Scholar 

  9. Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84(2), 139–161 (1977)

    Article  Google Scholar 

  10. LaMorte, W. The Social Cognitive Theory (2019)

    Google Scholar 

  11. Bandura, A.: Self-Efficacy: The Exercise of Control. Worth Publishers, New York (1997)

    Google Scholar 

  12. Ramalingam, V., Labelle, D., Wiedenbeck, S.: Self-efficacy and mental models in learning to program. ACM SIGCSE Bull. 36(3), 171–175 (2004)

    Article  Google Scholar 

  13. Gurer, M., Cetin, I., Top, E.: Factors affecting students’ attitudes toward computer programming. Inform. Educ. 18(2), 281–296 (2019)

    Article  Google Scholar 

  14. Ramalingam, V., Wiedenbeck, S.: Development and validation of scores on a computer programming self-efficacy scale and group analyses of novice programmer self-efficacy. J. Educ. Comput. Res. 19(4), 367–381 (1998)

    Article  Google Scholar 

  15. Sherer, M., Adams, C.: Construct validation of the self-efficacy scale. Psychol. Rep. 53(3), 899–902 (1983)

    Article  Google Scholar 

  16. Chen, G., Gully, S., Eden, D.: Validation of a new general self-efficacy scale. Organ. Res. Methods 4(1), 62–83 (2001)

    Article  Google Scholar 

  17. Bishop, M., Dai, J., Dark, M., Ngambeki, I., Nico, P., Zhu, M.: Evaluating secure programming knowledge. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. (eds.) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, vol. 503. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58553-6_5

  18. Dark, M., Ngambeki, I., Bishop, M., Belcher, S.: Teach the hands, train the mind . . . a secure programming clinic! In: Proceedings of the 19th Colloquium for Information Systems Security Education, pp. 119–133 (2015)

    Google Scholar 

  19. Frieze, C., Quesenberry, J.: How computer science at CMU is attracting and retaining women. Commun. ACM 62(2), 23–26 (2019)

    Article  Google Scholar 

  20. Ganley, C., George, C., Cimoian, J., Makowski, M.: Gender equity in college majors: looking beyond the stem/non-stem dichotomy for answers regarding female participation. Am. Educ. Res. J. 15(3), 453–487 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ida Ngambeki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bishop, M., Ngambeki, I., Mian, S., Dai, J., Nico, P. (2021). Measuring Self-efficacy in Secure Programming. In: Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S. (eds) Information Security Education for Cyber Resilience. WISE 2021. IFIP Advances in Information and Communication Technology, vol 615. Springer, Cham. https://doi.org/10.1007/978-3-030-80865-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-80865-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-80864-8

  • Online ISBN: 978-3-030-80865-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics