of the developers focus on meeting the require-
ments and customer satisfaction delivering their
preferred features on time with the least cost. Be-
sides, the limitation of the project budget offered
to the software projects often stands against the
adoption of security in SDL as the main goal.
6 THREATS TO VALIDITY
The size of the sample may be relatively small (40
participants). However, this sample is acceptable
since the Palestinian IT sector is relatively small. On
the other hand, the results of this research are limited
to the Palestinian IT sector, and hence, it could not be
generalized but can be replicated in other countries.
1. Internal Validity: Few participants know the au-
thors in person. Thus, their responses to this fact
may be affected by the participant trying to sat-
isfy the author by choosing the answer that cor-
responds with the survey context. However, the
number of them is limited, as the survey was de-
livered to companies without revealing personal
information about the author.
2. Construct Validity: The participants could guess
the research questions from the context of the sur-
vey title. Therefore, some participants’ might an-
swers to the survey may be affected. However,
we think that the number of participants affected
by their responses, if any, was few since we are
dealing with mature and independent participants
with their opinions.
3. External Validity: The sample as described in sec-
tion 3 was limited to the Palestinian IT sector.
However, the study took into consideration the di-
versity of the sample selection as software devel-
opers from various sectors, experiences, and com-
pany sizes, which ensures that the sample is as
representative as possible.
7 CONCLUSION
The adherence to secure SDL of the Palestinian IT
market is still modest, immature, and unsystematic,
as non of the surveyed companies followed one of
the known security models, such as Microsoft SDL,
rather than, security in SDL is taken into consider-
ation based on the developer skills and knowledge.
Moreover, most of the security practices are not ap-
plied even during the project timeline. Successful
adoption of a secure software development process re-
quires company cultural change, in addition to devel-
opers’ training and adopting the technical practices.
Thus, it is important for software development com-
panies to adopt their own customized secure SDL.
REFERENCES
Alghamdi, F. (2020). Motivational company’s character-
istics to secure software. In 2020 3rd International
Conference on Computer Applications & Information
Security (ICCAIS), pages 1–5. IEEE.
Assal, H. and Chiasson, S. (2019). ’think secure from the
beginning’ a survey with software developers. In Pro-
ceedings of the 2019 CHI conference on human fac-
tors in computing systems, pages 1–13.
Bendovschi, A. (2015). Cyber-attacks – trends, patterns and
security countermeasures. Procedia Economics and
Finance, 28:24–31. 7th INTERNATIONAL CON-
FERENCE ON FINANCIAL CRIMINOLOGY 2015,
7th ICFC 2015, 13-14 April 2015,Wadham College,
Oxford University, United Kingdom.
Cashell, B., Jackson, W. D., Jickling, M., and Webel, B.
(2004). The economic impact of cyber-attacks. Con-
gressional research service documents, CRS RL32331
(Washington DC), 2.
Council, N. R. et al. (2007). Software for dependable sys-
tems: Sufficient evidence? National Academies Press.
McGraw, G. (2004). Software security. IEEE Security &
Privacy, 2(2):80–83.
McGraw, G. (2006). Software security:Building Security in.
Addison-Wesley Professional.
McGraw, G., Chess, B., and Migues, S. (2009). Building
security in maturity model. Fortify & Cigital.
Morrison, P., Smith, B. H., and Williams, L. (2017). Sur-
veying security practice adherence in software devel-
opment. In Proceedings of the Hot Topics in Science
of Security: Symposium and Bootcamp, pages 85–94.
Saldana, J. (2012). The Coding Manual for Qualitative Re-
searchers. SAGE Publications.
Tariq, N. (2018). Impact of cyberattacks on financial insti-
tutions. Journal of Internet Banking and Commerce,
23(2):1–11.
Team, M. (2022). About microsoft sdl. https://www.
microsoft.com/en-us/securityengineering/sdl/about.
Thomas, T. W., Tabassum, M., Chu, B., and Lipford, H.
(2018). Security during application development: An
application security expert perspective. In Proceed-
ings of the 2018 CHI Conference on Human Factors
in Computing Systems, pages 1–12.
Venson, E., Alfayez, R., Gomes, M. M., Figueiredo, R. M.,
and Boehm, B. (2019). The impact of software secu-
rity practices on development effort: An initial sur-
vey. In 2019 ACM/IEEE International Symposium
on Empirical Software Engineering and Measurement
(ESEM), pages 1–12. IEEE.
Adherence to Secure Software Development Lifecycle
417