Agile practitioners' understanding of security requirements: Insights from a grounded theory analysis

Evenynke Terpstra, Maya Daneva, Chong Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

Abstract

A 2017 systematic review on engineering non-functional requirements in agile projects revealed a number of published proposals for approaching security requirements in agile settings. While these proposals acknowledge the urgent need for methods to systematically engineer security requirements in agile projects, they were designed mostly in academic settings. Very little empirical evaluation of these proposals happened in real-life contexts. In turn, little is known about how agile developers understand security requirements and how they devise their coping strategies regarding these requirements. This position paper presents a qualitative analysis that sought to discover how agile practitioners reason about security requirements, what contextual factors they consider important for shaping the pro-cess of coping with security requirements in agile projects, and what these strategies are. We conclude with some implications for practice and research.

Original languageEnglish
Title of host publication2017 IEEE 25th International Requirements Engineering Conference Workshops, REW 2017
Subtitle of host publicationProceedings
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages439-442
Number of pages4
ISBN (Electronic)978-1-5386-3488-2
ISBN (Print)978-1-5386-3489-9
DOIs
Publication statusPublished - 29 Sep 2017
Event25th IEEE International Requirements Engineering Conference Workshops, REW 2017 - Lisbon, Portugal
Duration: 4 Sep 20178 Sep 2017
Conference number: 25

Conference

Conference25th IEEE International Requirements Engineering Conference Workshops, REW 2017
Abbreviated titleREW 2017
CountryPortugal
CityLisbon
Period4/09/178/09/17

Keywords

  • Agile project development
  • Agile project management
  • Empirical research method
  • Qualitative study
  • Security requirements engineering

Fingerprint

Dive into the research topics of 'Agile practitioners' understanding of security requirements: Insights from a grounded theory analysis'. Together they form a unique fingerprint.

Cite this