Secure Web Application Development Guidelines

An experiment to check the leverage of purposed guidelines.


You can find informed consent here.

Below are instructions to participate in experiment:

  1. Kindly fill the first two questionnaires which are Questionaire 1 and  Questionaire 2 .
  2. After solving above two questionnaires study the guidelines to avoid vulnerability and security attacks. You can find guidelines here.
  3. After you are finished reading, fill the two more questionnaires which are Questionaire 3  and Questionaire 4 .
Thank you for your time and cooperation.