This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions. The use of a simple security requirements process in the first dimension has been augmented by an agile security approach. However, introducing this second dimension of agile security does provide support for, but does not necessarily stimulate, innovation. A third dimension is, therefore, needed to ensure there is a proper focus in the organisation's efforts to identify potential new innovations in t...
Agile development methods are promising to become the next generation replacing water-fall developme...
Although agile methods gained popularity and became globally widespread, developing secure software ...
Defects in requirements specifications can have severe consequences during the software development ...
This paper proposes to address the need for more innovation in organisational information security b...
This paper proposes to address the need for more innovation in organisational information security b...
[Background] The rapidly changing business environments in which many companies operate is challengi...
Currently many software companies attempt the integration of agile project delivery models and secur...
In this article, we contrast the results of a series of interviews with agile software development o...
[Background] The rapidly changing business environments in which many companies operate is challengi...
Agile is the contemporary development practice of choice but security has been claimed as a challeng...
Agile is the contemporary development practice of choice but security has been claimed as a challeng...
In this paper we present an approach for specifying and prioritizing information security requiremen...
© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS ...
A 2017 systematic review on engineering non-functional requirements in agile projects revealed a num...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
Agile development methods are promising to become the next generation replacing water-fall developme...
Although agile methods gained popularity and became globally widespread, developing secure software ...
Defects in requirements specifications can have severe consequences during the software development ...
This paper proposes to address the need for more innovation in organisational information security b...
This paper proposes to address the need for more innovation in organisational information security b...
[Background] The rapidly changing business environments in which many companies operate is challengi...
Currently many software companies attempt the integration of agile project delivery models and secur...
In this article, we contrast the results of a series of interviews with agile software development o...
[Background] The rapidly changing business environments in which many companies operate is challengi...
Agile is the contemporary development practice of choice but security has been claimed as a challeng...
Agile is the contemporary development practice of choice but security has been claimed as a challeng...
In this paper we present an approach for specifying and prioritizing information security requiremen...
© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS ...
A 2017 systematic review on engineering non-functional requirements in agile projects revealed a num...
Abstract. In this paper we present an approach for specifying and pri-oritizing information security...
Agile development methods are promising to become the next generation replacing water-fall developme...
Although agile methods gained popularity and became globally widespread, developing secure software ...
Defects in requirements specifications can have severe consequences during the software development ...