Related references
Note: Only part of the references are listed.Strategies to manage quality requirements in agile software development: a multiple case study
Pertti Karhapaa et al.
EMPIRICAL SOFTWARE ENGINEERING (2021)
A validated model for the scoping process of quality requirements: a multi-case study
Thomas Olsson et al.
EMPIRICAL SOFTWARE ENGINEERING (2021)
Management of quality requirements in agile and rapid software development: A systematic mapping study
Woubshet Behutiye et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2020)
Interventions for long-term software security creating a lightweight program of assurance techniques for developers
Charles Weir et al.
SOFTWARE-PRACTICE & EXPERIENCE (2020)
IT Security Is From Mars, Software Security Is From Venus
Inger Anne Tondel et al.
IEEE SECURITY & PRIVACY (2020)
Time pressure in human cyb ersecurity b ehavior: Theoretical framework and countermeasures
Noman H. Chowdhury et al.
COMPUTERS & SECURITY (2020)
20 Years of Software Security
John Viega
COMPUTER (2020)
Challenging software developers: dialectic as a foundation for security assurance techniques
Charles Weir et al.
JOURNAL OF CYBERSECURITY (2020)
Quality requirements challenges in the context of large-scale distributed agile: An empirical study
Wasim Alsaqaf et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2019)
An empirical study on decision making for quality requirements
Thomas Olsson et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2019)
Security Dialogues: Building Better Relationships between Security and Business
Debi Ashenden et al.
IEEE SECURITY & PRIVACY (2016)
A systematic literature review on agile requirements engineering practices and challenges
Irum Inayat et al.
COMPUTERS IN HUMAN BEHAVIOR (2015)
Protection Poker: The New Software Security Game
Laurie Williams et al.
IEEE SECURITY & PRIVACY (2010)
Guidelines for conducting and reporting case study research in software engineering
Per Runeson et al.
EMPIRICAL SOFTWARE ENGINEERING (2009)
Software quality requirements: How to balance competing priorities
J. David Blaine et al.
IEEE SOFTWARE (2008)
Bridging the gap between software development and information security
KR van Wyk et al.
IEEE SECURITY & PRIVACY (2005)