Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

A Yasin, L Liu, T Li, J Wang, D Zowghi - Information and Software …, 2018 - Elsevier
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …

Systematic literature mapping of user story research

AR Amna, G Poels - IEEE Access, 2022 - ieeexplore.ieee.org
User stories are a widely used artifact in Agile software development. Currently, only a
limited number of secondary studies have reviewed the research on the user story …

[HTML][HTML] Security in agile software development: A practitioner survey

K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi… - Information and …, 2021 - Elsevier
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …

Adopting threat modelling in agile software development projects

K Bernsmed, DS Cruzes, MG Jaatun, M Iovan - Journal of Systems and …, 2022 - Elsevier
The goal of secure software engineering is to create software that keeps performing as
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …

[HTML][HTML] A mapping study on documentation in Continuous Software Development

T Theunissen, U van Heesch, P Avgeriou - Information and software …, 2022 - Elsevier
Context: With an increase in Agile, Lean, and DevOps software methodologies over the last
years (collectively referred to as Continuous Software Development (CSD)), we have …

Security requirements for the rest of us: A survey

IA Tondel, MG Jaatun, PH Meland - IEEE software, 2008 - ieeexplore.ieee.org
Most software developers aren't primarily interested in security. For decades, the focus has
been on implementing as much functionality as possible before the deadline, and patching …

A conceptual model of agile software development in a safety-critical context: A systematic literature review

LT Heeager, PA Nielsen - Information and Software Technology, 2018 - Elsevier
Context Safety-critical software systems are increasingly being used in new application
areas, such as personal medical devices, traffic control, and detection of pathogens. A …

Practitioners' perspectives on security in agile development

S Bartsch - 2011 Sixth International Conference on Availability …, 2011 - ieeexplore.ieee.org
Agile methods are widely employed to develop high-quality software, but theoretical
analyses argue that agile methods are inadequate for security-critical projects. However …

Survey and analysis on security requirements engineering

P Salini, S Kanmani - Computers & Electrical Engineering, 2012 - Elsevier
Security Requirements Engineering is a new research area in software engineering, with the
realization that security must be analyzed early during the requirements phase. Many …

Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security

A Yasin, R Fatima, Z JiangBin, W Afzal… - Information and Software …, 2024 - Elsevier
Context: In the digital age, there is a notable increase in fraudulent activities perpetrated by
social engineers who exploit individuals' limited knowledge of digital devices. These actors …