4.5 Article

Influencing the security prioritisation of an agile software development project

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Strategies to manage quality requirements in agile software development: a multiple case study

Pertti Karhapaa et al.

Summary: This study examined how companies using agile methods manage quality requirements (QRs) and identified proactive, reactive, and interactive strategies they employ. It also revealed 40 challenges and nine contextual elements that influence QR management practice choices. The findings were used to construct a theoretical model linking context, QR management practices, and challenges.

EMPIRICAL SOFTWARE ENGINEERING (2021)

Article Computer Science, Software Engineering

A validated model for the scoping process of quality requirements: a multi-case study

Thomas Olsson et al.

Summary: Quality requirements are crucial for successful software product development, but current evidence suggests that they are often managed in an ad hoc manner and given low priority. To address this issue, a conceptual model and assessment model have been developed to help companies evaluate and improve their quality requirements practices. Despite the potential for data-driven quality requirements management, companies lag in implementation and do not systematically incorporate quality requirements practices into their strategic planning. Additional coupling of quality requirements practices to success factors and improvements in business intelligence for selecting data sources and stakeholders are seen as necessary areas for development.

EMPIRICAL SOFTWARE ENGINEERING (2021)

Review Computer Science, Information Systems

Management of quality requirements in agile and rapid software development: A systematic mapping study

Woubshet Behutiye et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2020)

Article Computer Science, Software Engineering

Interventions for long-term software security creating a lightweight program of assurance techniques for developers

Charles Weir et al.

SOFTWARE-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Information Systems

IT Security Is From Mars, Software Security Is From Venus

Inger Anne Tondel et al.

IEEE SECURITY & PRIVACY (2020)

Article Computer Science, Information Systems

Time pressure in human cyb ersecurity b ehavior: Theoretical framework and countermeasures

Noman H. Chowdhury et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Hardware & Architecture

20 Years of Software Security

John Viega

COMPUTER (2020)

Article Social Sciences, Interdisciplinary

Challenging software developers: dialectic as a foundation for security assurance techniques

Charles Weir et al.

JOURNAL OF CYBERSECURITY (2020)

Article Computer Science, Information Systems

Quality requirements challenges in the context of large-scale distributed agile: An empirical study

Wasim Alsaqaf et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2019)

Article Computer Science, Software Engineering

An empirical study on decision making for quality requirements

Thomas Olsson et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2019)

Editorial Material Computer Science, Information Systems

Security Dialogues: Building Better Relationships between Security and Business

Debi Ashenden et al.

IEEE SECURITY & PRIVACY (2016)

Review Psychology, Multidisciplinary

A systematic literature review on agile requirements engineering practices and challenges

Irum Inayat et al.

COMPUTERS IN HUMAN BEHAVIOR (2015)

Article Computer Science, Information Systems

Protection Poker: The New Software Security Game

Laurie Williams et al.

IEEE SECURITY & PRIVACY (2010)

Article Computer Science, Software Engineering

Guidelines for conducting and reporting case study research in software engineering

Per Runeson et al.

EMPIRICAL SOFTWARE ENGINEERING (2009)

Editorial Material Computer Science, Software Engineering

Software quality requirements: How to balance competing priorities

J. David Blaine et al.

IEEE SOFTWARE (2008)

Article Computer Science, Information Systems

Bridging the gap between software development and information security

KR van Wyk et al.

IEEE SECURITY & PRIVACY (2005)