Reference Hub3
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development

Towards a Conceptual Framework for Security Requirements Work in Agile Software Development

Inger Anne Tøndel, Martin Gilje Jaatun
Copyright: © 2020 |Volume: 11 |Issue: 1 |Pages: 30
ISSN: 2640-4265|EISSN: 2640-4273|EISBN13: 9781799809173|DOI: 10.4018/IJSSSP.2020010103
Cite Article Cite Article

MLA

Tøndel, Inger Anne, and Martin Gilje Jaatun. "Towards a Conceptual Framework for Security Requirements Work in Agile Software Development." IJSSSP vol.11, no.1 2020: pp.33-62. http://doi.org/10.4018/IJSSSP.2020010103

APA

Tøndel, I. A. & Jaatun, M. G. (2020). Towards a Conceptual Framework for Security Requirements Work in Agile Software Development. International Journal of Systems and Software Security and Protection (IJSSSP), 11(1), 33-62. http://doi.org/10.4018/IJSSSP.2020010103

Chicago

Tøndel, Inger Anne, and Martin Gilje Jaatun. "Towards a Conceptual Framework for Security Requirements Work in Agile Software Development," International Journal of Systems and Software Security and Protection (IJSSSP) 11, no.1: 33-62. http://doi.org/10.4018/IJSSSP.2020010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security requirement work plays a key role in achieving cost-effective and adequate security in a software development project. Knowledge about software companies' experiences of security requirement work is important in order to bridge the observed gap between software security practices and security risks in many projects today. Particularly, such knowledge can help researchers improve on available practices and recommendations. This article uses the results of published empirical studies on security requirement work to create a conceptual framework that shows key concepts related to work context, this work itself and the effects of this work. The resulting framework points to the following research challenges: 1) Identifying and understanding factors important for the effect of security requirements work; 2) Understanding what is the importance of the chosen requirements approach itself, and; 3) Properly taking into account contextual factors, especially factors related to individuals and interactions, in planning and analysis of empirical studies on security requirements work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.