Content area
The researcher used a generic qualitative inquiry to explore factors that influence the integration of secure code development protocols within the software development lifecycle. Most institutions in all industry sectors rely on the Internet to conduct business. Although this technology, driven by web applications, has improved the quality of life in communities and streamlined business processes, it has also increased the likelihood of security violations. To this end, the web application has become the epicenter for business communication and a lucrative target for cybersecurity criminals. Since research has confirmed that 70 percent of security violations are caused by human error or failure to comply with security policies and regulations, this study is focused on improving the quality of web applications by investigating factors that influence the integration of secure coding practices within the software development lifecycle. The research analysis question is. "How do software developers implement, navigate, and perceive behavioral challenges and the impacts of integrating secure code development protocols within the software development lifecycle, particularly in enhancing web application security against SQL Injection Attacks (SQLIs)?" The researcher employed a theory of planned behavior (TPB) as the conceptual framework to guide the study. Ten seasoned developers were interviewed by the researcher, using semi-structured interviews and open-ended interview questions to elicit insights into the developers' experiences, opinions, and perceptions on integrating secure coding practices within the software development lifecycle. Semi-structured and structured questions were used to elicit more detailed information from the participants. The researcher used Zoom to conduct interviews with participants. The data was collected via audio recordings, which were transcribed. The data transcripts were uploaded into NVivo 14 software. The uploaded data was inductively analyzed. Recurring themes were generated using NVivo 14 to code the transcribed data, and five themes emerged from the analysis. The five themes identified include Theme 1: Security Awareness and Training, Theme 2: Organizational Support and Resources, Theme 3: Challenges of Secure Coding Integration, Theme 4: Security Automation and Tools, and Theme 5: Trade-offs Between Security and Timelines. The identified themes provided insights into significantly improved understandings of the complexity and challenging nature of the factors that influence the integration of secure coding practices within the software development lifecycle, aiming to produce resilient web applications with minimal or no vulnerabilities, specifically SQLI risks. These research findings provide a foundation upon which software houses can create operational environments conducive to integrating secure code development protocols within the software development lifecycle.