Secure Web Application Development Guidelines
An experiment to check the leverage of purposed guidelines.
You can find informed consent here.
Below are instructions to participate in experiment:
- Kindly fill the first two questionnaires which are Questionaire 1 and Questionaire 2 .
- After solving above two questionnaires study the guidelines to avoid vulnerability and security attacks. You can find guidelines here.
- After you are finished reading, fill the two more questionnaires which are Questionaire 3 and Questionaire 4 .
Thank you for your time and cooperation.