Show simple item record

dc.contributor.authorTøndel, Inger Anne
dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorCruzes, Daniela Soares
dc.contributor.authorOyetoyan, Tosin Daniel
dc.date.accessioned2019-11-08T09:58:33Z
dc.date.available2019-11-08T09:58:33Z
dc.date.created2019-02-04T12:32:03Z
dc.date.issued2019
dc.identifier.isbn978-3-030-12786-2
dc.identifier.urihttp://hdl.handle.net/11250/2627369
dc.description.abstractCurrently, security requirements are often neglected in agile projects. Despite many approaches to agile security requirements engineering in literature, there is little empirical research available on why there is limited adoption of these techniques. In this paper we describe a case study on challenges facing adoption of the Protection Poker game; a collaborative and lightweight software security risk estimation technique that is particularly suited for agile teams. Results show that Protection Poker has the potential to be adopted by agile teams. Key benefits identified include good discussions on security and the development project, increased knowledge and awareness of security, and contributions to security requirements. Challenges include managing discussions and the time it takes to play, ensuring confidence in the results from playing the game, and integrating results in a way that improves security of the end-product.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.relation.ispartofComputer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
dc.titleUnderstanding Challenges to Adoption of the Protection Poker Software Security Gamenb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber153-172nb_NO
dc.identifier.doi10.1007/978-3-030-12786-2_10
dc.identifier.cristin1673017
dc.relation.projectNorges forskningsråd: 247678nb_NO
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [International Workshop on Security and Privacy Requirements Engineering] Locked until 31.1.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-12786-2_10nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record