DeveloperLiberationFront / iTrustInterviews

0 stars 0 forks source link

Strategy and assumption results poorly developed #432

Closed jssmith1 closed 7 years ago

jssmith1 commented 7 years ago

R3:

  • The sections 3.2-3.5 which report the new findings (i.e., strategies and assumptions) are not well developed. They only report the strategies: some are very short (e.g., 3.2.4). Some are very general and do not apply necessarily to the context of vulnerability (e.g., 3.3.1).
jssmith1 commented 7 years ago

Related to #431

jssmith1 commented 7 years ago

Somewhat related to #423

jssmith1 commented 7 years ago

We reported the assumptions where they could be associated with information needs. We now report them more completely in the appendix. We summarized our strategies for brevity, especially in categories where participants did not pursue strategies actively. The full 40 pages can be found in the online archive. We agree with the reviewer that some strategies are general, but don't view it as a problem. The generality suggests improving these strategies would also benefit developers in diagnosing security vulnerabilities.