Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …
many different perspectives, including social, physical, and technical factors. In order to …
Systematic literature mapping of user story research
User stories are a widely used artifact in Agile software development. Currently, only a
limited number of secondary studies have reviewed the research on the user story …
limited number of secondary studies have reviewed the research on the user story …
[HTML][HTML] Security in agile software development: A practitioner survey
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …
security in software products. Software security engineering is performed by following a …
Adopting threat modelling in agile software development projects
The goal of secure software engineering is to create software that keeps performing as
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …
intended, even when exposed to attacks. Threat modelling is considered to be a key activity …
[HTML][HTML] A mapping study on documentation in Continuous Software Development
T Theunissen, U van Heesch, P Avgeriou - Information and software …, 2022 - Elsevier
Context: With an increase in Agile, Lean, and DevOps software methodologies over the last
years (collectively referred to as Continuous Software Development (CSD)), we have …
years (collectively referred to as Continuous Software Development (CSD)), we have …
Security requirements for the rest of us: A survey
Most software developers aren't primarily interested in security. For decades, the focus has
been on implementing as much functionality as possible before the deadline, and patching …
been on implementing as much functionality as possible before the deadline, and patching …
A conceptual model of agile software development in a safety-critical context: A systematic literature review
LT Heeager, PA Nielsen - Information and Software Technology, 2018 - Elsevier
Context Safety-critical software systems are increasingly being used in new application
areas, such as personal medical devices, traffic control, and detection of pathogens. A …
areas, such as personal medical devices, traffic control, and detection of pathogens. A …
Practitioners' perspectives on security in agile development
S Bartsch - 2011 Sixth International Conference on Availability …, 2011 - ieeexplore.ieee.org
Agile methods are widely employed to develop high-quality software, but theoretical
analyses argue that agile methods are inadequate for security-critical projects. However …
analyses argue that agile methods are inadequate for security-critical projects. However …
Survey and analysis on security requirements engineering
Security Requirements Engineering is a new research area in software engineering, with the
realization that security must be analyzed early during the requirements phase. Many …
realization that security must be analyzed early during the requirements phase. Many …
Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security
Context: In the digital age, there is a notable increase in fraudulent activities perpetrated by
social engineers who exploit individuals' limited knowledge of digital devices. These actors …
social engineers who exploit individuals' limited knowledge of digital devices. These actors …