Show simple item record

dc.contributor.authorTøndel, Inger Anne
dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorCruzes, Daniela Soares
dc.contributor.authorOyetoyan, Tosin Daniel
dc.date.accessioned2020-05-06T07:44:40Z
dc.date.available2020-05-06T07:44:40Z
dc.date.created2019-02-04T12:32:03Z
dc.date.issued2019
dc.identifier.isbn978-3-030-12786-2
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2653417
dc.descriptionThe final publication is available at Springer via http://dx.doi.org/10.1007/978-3-030-12786-2_10en_US
dc.description.abstractCurrently, security requirements are often neglected in agile projects. Despite many approaches to agile security requirements engineering in literature, there is little empirical research available on why there is limited adoption of these techniques. In this paper we describe a case study on challenges facing adoption of the Protection Poker game; a collaborative and lightweight software security risk estimation technique that is particularly suited for agile teams. Results show that Protection Poker has the potential to be adopted by agile teams. Key benefits identified include good discussions on security and the development project, increased knowledge and awareness of security, and contributions to security requirements. Challenges include managing discussions and the time it takes to play, ensuring confidence in the results from playing the game, and integrating results in a way that improves security of the end-product.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofComputer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
dc.relation.ispartofseriesLecture Notes in Computer Science (LNCS);
dc.subjectAgile projectsen_US
dc.subjectSecurity requirementsen_US
dc.subjectProtection Pokeren_US
dc.subjectRisk estimationen_US
dc.titleUnderstanding Challenges to Adoption of the Protection Poker Software Security Gameen_US
dc.typeChapteren_US
dc.typePeer revieweden_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber153-172en_US
dc.source.volume11387en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.cristin1673017
dc.relation.projectNorges forskningsråd: 247678en_US
cristin.unitcode7401,90,13,0
cristin.unitnameSoftware Engineering, Safety and Security
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record