Agile Development of Critical Software – Can It be Justified?

Janusz Górski, Katarzyna Łukasiewicz


The paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering such a model is presented together with a case study description which is a step of this research project. The case study will investigate how software engineers perceive risks associated with introduction of agile practices and collect their ideas on how these risks could be mitigated.


  1. Agile Manifesto, 2001. Agile Manifesto. [online] Available at: <> [accessed January 2012]
  2. AgileTek, 2012. AgileTek. [online] Available at http:// [accessed January 2012]
  3. Alleman, G. B., Henderson, M., Hill, C. H. M., & Seggelke, R., 2003. Making Agile Development Work in a Government Contracting Environment Measuring velocity with Earned Value. In Proceedings of the Agile Development Conference 2003, Salt Lake City, Utah, 25-28 June 2003, IEEE Computer Society, pp. 114-120.
  4. Animas One Touch Ping, 2012. Insulin pump. [online] Available at <> [accessed February 2012]
  5. Babuscio, J., 2009. How the FBI Learned to Catch Bad Guys One Iteration at a Time. In 2009 Agile Conference Proceedings,Chicago, USA, 24-28 August 2009. IEEE Computer Society, Los Alamitos 2009, pp. 96-100
  6. Boehm, B. & R. Turner, 2003. Balancing Agility and Discipline: A Guide for the Perplexed. Addison Wesley, 2003.
  7. Bulska, K., 2010. Integration of the agile software development methodologies with maturity models - good practices assistant, MSc thesis, Gdansk University of Technology, Gdansk, 2010. (in Polish)
  8. Cyra L., Górski J., 2011. SCF - a Framework Supporting Achieving and Assessing Conformity with Standards. In Computer Standards & Interfaces, Elsevier, 33, 2011, pp. 80-95
  9. Cyra L., Górski J., 2011. Support for Argument Structures Review and Assessment. In Reliability Engineering and System Safety, Elsevier, 96, 2011, pp.26-37
  10. Designsafe, 2012. Designsafe tool. [online] Available at <> [accessed Jan. 2012]
  11. Diaz J., Garbajosa J., Calvo-Manzano J. A., 2009. Mapping CMMI Level 2 to Scrum Practices: An Experience Report. In EuroSPI 2009 Proceedings. Alcala, Spain, 2-4 September 2009. Springer, Heidelberg, pp. 93-104
  12. ERM - Workshop on Selected Problems in Environmental Risk Management and Emerging Threats, 2009. Proc. of the Workshop on Selected Problems in Environmental Risk Management and Emerging Threats, June 2009, Gdansk, Poland [online] Available at <> [accessed February 2012]
  13. eXtreme Programming, 2009. Extreme Programming: A gentle introduction. [online] Available at <http://www.> [accessed January 2012]
  14. Fritzsche, M., Keil, P., 2007. Agile methods and cmmi: Compatibility or conflict? In e-Informatica Software Engineering Journal, 1(1), pp. 9-26
  15. Ge, X., Paige, R. F., McDermid, J., 2010. An Iterative Approach for Development of Safety-Critical Software and Safety Arguments. In 2010 Agile Conference Proceedings, Orlando, USA, 9-13 August 2010. IEEE Computer Society, Los Alamitos 2009, pp. 35-43
  16. Glazer, H., Anderson, D., Anderson, D. J., Konrad, M., & Shrum, S., 2008. CMMI or Agile : Why Not Embrace Both! In Software Engineering Process Management - Technical Note for Software Engineering Institute, Carnegie Mellon University.
  17. Górski J, Jarzebowicz A, Leszczyna R, Miler J, Olszewski M., 2005. Trust Case: Justifying Trust. In IT Solution. Elsevier, Reliability Engineering and System Safety, 2005, 89, p. 33-47.
  18. Górski J., 2005. Trust Case - a case for trustworthiness of IT infrastructures. In Cyberspace Security and Defense: Research Issues, NATO Science Series II: Mathematics, Physics and Chemistry, 196 (). SpringerVerlag, 2005, pp. 125-142.
  19. Górski J., 2007. Trust-IT - a framework for trust cases, Workshop on Assurance Cases for Security - The Metrics Challenge. In Proceedings of DSN 2007, June 25-28, Edinburgh, UK, 2007, pp. 204-209.
  20. Górski J., Jarzebowicz A., Miler J., 2008. Arguing trustworthiness of e-health services with the Trust-IT framework. In Proceedings of 25th Anniversary Healthcare Computing: Invitation to the Future: Conference & Exhibition (HC 2008), Harrogate 21-23 April, 2008.
  21. Górski J., Jarzebowicz A., Miler J., 2012 (in press). Validation of services supporting healthcare standards conformance. (accepted for publication in Metrology and Measurement Systems, 2012)
  22. Lindvall M., Muthig D., Dagnino A., Wallin C., Stupperich M., Kiefer D., May J. & Kähkönen T., 2004. Agile Software Development in Large Organizations. In Computer, 37(12), pp. 26-34.
  23. Marçal, A. C., de Freitas B. C., Furtado Soares F. S., Furtado M. S., Maciel T. M., Belchior A. D., 2008. Blending Scrum practices and CMMI project management process areas. In Innovations in Systems and Software Engineering, 4(1), pp. 17-29
  24. NOR-STA, 2012. NOR-STA project Portal. [online] Available at <> [accessed February 2012]
  25. Paige R., Charalambous R., Ge X., Brooke P., 2008. Towards Agile Engineering of High-Integrity Systems. In Proceedings of 27th International Conference on Computer Safety, Reliability and Security (SAFECOMP), 22-25 September 2008, Newcastle upon Tyne, UK.
  26. Petersen, K., & Wohlin, C., 2010. The effect of moving from a plan-driven to an incremental software development approach with agile practices. In Empirical Software Engineering, 15(6), pp. 654-693.
  27. Pikkarainen M., Mantyniemi, A., 2006. An Approach For Using CMMI in Agile Software Development Assessments: Experiences From Three Case Studies. In Proceedings of SPICE Conference, Luxembourg, 3- 5 May 2006.
  28. Poppendieck M. and T., 2003. Lean software development: an agile toolkit, Addison-Wesley, 2003.
  29. Potter, N., Sakry M., 2009. Implementing Scrum (Agile) and CMMI together. [online] Process Group Post Newsletter, 16(2). Available at: < /assets/base/images/itmpi/Potter-ScrumCMMI.pdf> [accessed January 2012]
  30. Rasmussen, R., Hughes, T., Jenks, J. R., & Skach, J., 2009. Adopting Agile in an FDA Regulated Environment. In 2009 Agile Conference Proceedings, Chicago, USA, 24-28 August 2009. IEEE Computer Society, Los Alamitos 2009, pp. 151-155.
  31. Sentez K., Ferson S., 2002. Combination of evidence in Dempster-Shafer theory. SANDIA National Laboratories.
  32. Schwaber, K., Beedle, M., 2001. Agile Software Development with Scrum. Prentice Hall, 2001.
  33. Stephenson Z., McDermid J., Ward A., 2006. Health Modelling for Agility in Safety-Critical Systems Development. In Proceedings of the First IET International Conference on System Safety Engineering, 6-8 June 2006, London, UK.
  34. Weiguo L., Xiaomin F., 2009. Software Development Practice for FDA-Compliant Medical Devices. In Proceedings of the 2009 International Joint Conference on Computational Sciences and Optimization, 24-26 April, 2009, Sanya, China.

Paper Citation

in Harvard Style

Górski J. and Łukasiewicz K. (2012). Agile Development of Critical Software – Can It be Justified? . In Proceedings of the 7th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE, ISBN 978-989-8565-13-6, pages 134-139. DOI: 10.5220/0003984101340139

in Bibtex Style

author={Janusz Górski and Katarzyna Łukasiewicz},
title={Agile Development of Critical Software – Can It be Justified?},
booktitle={Proceedings of the 7th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE,},

in EndNote Style

JO - Proceedings of the 7th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE,
TI - Agile Development of Critical Software – Can It be Justified?
SN - 978-989-8565-13-6
AU - Górski J.
AU - Łukasiewicz K.
PY - 2012
SP - 134
EP - 139
DO - 10.5220/0003984101340139