scholarly journals A Systematic Review of Software Security Issues Associated With Agile Software Development

2016 ◽  
Vol 18 (04) ◽  
pp. 65-67
Author(s):  
Prof. Manisha Tijare ◽  
Prof. Suman Tanwar ◽  
Prof. Seema Patil
Author(s):  
Shanmuganathan Vasanthapriyan

Agile software development (ASD) is a knowledge-intensive and collaborative activity and thus Knowledge Management (KM) principals should be applied to improve the productivity of the whole ASD process from the beginning to the end of the phase. The goal is to map the evidence available on existing researches on KM initiatives in ASD in order to identify the state of the art in the area as well as the future research. Therefore, investigation of various aspects such as purposes, types of knowledge, technologies and research type are essential. The authors conducted a systematic review of literature published between 2010 and December 2017 and identified 12 studies that discuss agile requirements engineering. They formulated and applied specific inclusion and exclusion criteria in two distinct rounds to determine the most relevant studies for their research goal. Reuse of knowledge of the team is the perspective that has received more attention.


Author(s):  
Ronald Jabangwe ◽  
Kati Kuusinen ◽  
Klaus R Riisom ◽  
Martin S Hubel ◽  
Hasan M Alradhi ◽  
...  

There has been a surge in the number of software security threats and vulnerabilities in recent times. At the same time, expectations towards software and data security are growing. Thus, there is a need to ensure that security-related tasks are effectively integrated in the software development processes. However, integrating security practices with agile software development is not trivial due to, for instance, differences in process dynamics and the concentration on functional vs non-functional requirements. In this article, the authors present a literature review on the challenges and solutions when adopting security in an agile software development context. Their findings suggest that there are ongoing efforts to integrate security-practices in agile methods, but more research is needed to make the processes more optimized and simpler for developers. A rigor and relevance assessment on primary studies highlights a need for improving the manner in which studies on the topic are performed as well as reported.


Author(s):  
Klaus Reche Riisom ◽  
Martin Slusarczyk Hubel ◽  
Hasan Mousa Alradhi ◽  
Niels Bonde Nielsen ◽  
Kati Kuusinen ◽  
...  

2015 ◽  
Vol 58 ◽  
pp. 20-43 ◽  
Author(s):  
Fernando Selleri Silva ◽  
Felipe Santana Furtado Soares ◽  
Angela Lima Peres ◽  
Ivanildo Monteiro de Azevedo ◽  
Ana Paula L.F. Vasconcelos ◽  
...  

2019 ◽  
Vol 27 (4) ◽  
pp. 508-535 ◽  
Author(s):  
Inger Anne Tøndel ◽  
Martin Gilje Jaatun ◽  
Daniela Soares Cruzes ◽  
Laurie Williams

PurposeToday, agile software development teams in general do not adopt security risk-assessment practices in an ongoing manner to prioritize security work. Protection Poker is a collaborative and lightweight software security risk-estimation technique that is particularly suited for agile teams. Motivated by a desire to understand why security risk assessments have not yet gained widespread adoption in agile development, this study aims to assess to what extent the Protection Poker game would be accepted by agile teams and how it can be successfully integrated into the agile practices.Design/methodology/approachProtection Poker was studied in capstone projects, in teams doing a graduate software security course and in sessions with industry representatives. Data were collected via questionnaires, observations and group interviews.FindingsResults show that Protection Poker has the potential to be adopted by agile teams. Key benefits include good discussions on security and the development project, along with increased knowledge and awareness. Challenges include ensuring efficient use of time and gaining impact on the end product.Research limitations/implicationsUsing students allowed easy access to subjects and an ability to collect rich data over time, but at the cost of generalizability to professional settings. Results from interactions with professionals supplement the data from students, showing similarities and differences in their opinions on Protection Poker.Originality/valueThe paper proposes ways to tackle the main obstacles to the adoption of the Protection Poker technique, as identified in this study.


2022 ◽  
pp. 2065-2081
Author(s):  
Shanmuganathan Vasanthapriyan

Agile software development (ASD) is a knowledge-intensive and collaborative activity and thus Knowledge Management (KM) principals should be applied to improve the productivity of the whole ASD process from the beginning to the end of the phase. The goal is to map the evidence available on existing researches on KM initiatives in ASD in order to identify the state of the art in the area as well as the future research. Therefore, investigation of various aspects such as purposes, types of knowledge, technologies and research type are essential. The authors conducted a systematic review of literature published between 2010 and December 2017 and identified 12 studies that discuss agile requirements engineering. They formulated and applied specific inclusion and exclusion criteria in two distinct rounds to determine the most relevant studies for their research goal. Reuse of knowledge of the team is the perspective that has received more attention.


Author(s):  
Ronald Jabangwe ◽  
Kati Kuusinen ◽  
Klaus R Riisom ◽  
Martin S Hubel ◽  
Hasan M Alradhi ◽  
...  

There has been a surge in the number of software security threats and vulnerabilities in recent times. At the same time, expectations towards software and data security are growing. Thus, there is a need to ensure that security-related tasks are effectively integrated in the software development processes. However, integrating security practices with agile software development is not trivial due to, for instance, differences in process dynamics and the concentration on functional vs non-functional requirements. In this article, the authors present a literature review on the challenges and solutions when adopting security in an agile software development context. Their findings suggest that there are ongoing efforts to integrate security-practices in agile methods, but more research is needed to make the processes more optimized and simpler for developers. A rigor and relevance assessment on primary studies highlights a need for improving the manner in which studies on the topic are performed as well as reported.


Sign in / Sign up

Export Citation Format

Share Document