ART of Review design security =0.85
ART of Static code analysis=0.8
Here,
n=3
AOM (Actual Agility of Model
Table 1 ) = 0.68
By putting the values in (3) we get,
Agility After Application of Security AAAS
= [((0.91+0.85+0.8) ÷3) × 0.68]
AAAS=0.58
In this case the AAAS of XP becomes 0.58
which is lower than its original value (0.68). The
effect of including selected security activities in XP
is visible in terms of reduced degree of agility. This
represents the cost that one has to bear in terms of
agility for including security practices.
5 CONCLUSIONS
The effect of including selected security activities
can be seen in both process models. This leads to
two conclusions. Firstly you are firm to use certain
security practices, let us say as your prime factor in
this case you can perform the calculations to see the
effect of your decision on agility of different process
models. Secondly, you are firm to use certain
process model and you are ready to adjust security
practices keeping the degree of agility of process
model as prime factor. Both of above-mentioned
approaches can be handled by proposed method.
6 FUTURE WORK
This research can serve as one major parameter for
selection of security practices. However, further
study is required to learn about different values of
same security activities in different process models.
Second area of further work on this topic is to
investigate other dimensions (for example time and
monetary factors) that can help in selection of
security activities. We will be looking into these
dimensions along with Agility Reduction Tolerance
of security activities in future in perspective of agile
process models.
REFERENCES
Alnatheer, Ahmed, Gravell, Andrew and Argles, & David.
(2010). Agile Secuirty Issues. International
Symposium on Empirical Software Engineeringl and
Measurement. Italy: ACM/IEEE.
Alreck, P.L., Settle, & R.B. (1995). The survey research
handbook:guidelines and strategies for conducting a
survey. IRWIN Professional Publishing.
Ashraf, S., & Aftab, & S. (2017). IScrum: An improved
scrum process model. Ashraf, S., & Aftab, S. (2017).
IScrum: A International Journal of Modern Education
and Computer Science (IJMECS), Ashraf, S., & Aftab,
S. (2017). IScrum: An improved scrum process model.
9(8), 16-24.
Ayalew, T., Kidane, T., & Carlsson, B. (2013).
Identification and Evaluation of Security Activities In
Agile Projects. Springer-Verlag Berlin Heidelberg
(pp. 139-153). Springer.
Beck, & Kent. (2004). Extreme Programming Explained,
Embrace Change. Addison-Wesley.
Boström, Gustav, & et al. (2006). Extending XP practices
to support security requirements engineering.
International workshop on Software engineering for
secure systems. ACM.
Hossein keramati, & Mirian-Hosseinabadi, S.-H. (2008).
Integrating Software development Security Activities
with Agile Methodologies. International Conference
on Computer Systems and Applications. Doha, Qatar:
IEEE.
Howard, M., & L. S. (2006). The Security Development
Lifecycle - SDL: A Process for Developing
Demonstrably More Secure Software. Microsoft Press.
Jacobson. (2002). A resounding 'Yes' to agile processes -
But also more. Cutter IT Journal, 15.
Jon A. Krosnick, & Presser, S. (2010). Handbook of
Survey Research. Emerald Group Publishing Limited.
K., R., S., H., & V., L. (August, 2017). Busting a myth:
Review of agile security engineering methods. In
Proceedings of the 12th International Conference on
Availability, Reliability and Security., 1-10.
K.Beck, M. A. (2001). The Agile Manifesto. Retrieved
from www.agie.alliance.org.
Ken Schwaber, & Beedle, M. (2002). Agile Software
Development with Scrum (Vol. 1). Upper Saddle
River: Prentice Hall.
Kravchenko, Elena, & E. W. (2017). Integrating Security
in Agile projects. Belfast: OWASP.
L. R. (1932). A Technique for the Measurement of
Attitudes. Archives of Psychology, Vol. 22, No. 140,
pp. 1-55.
McGraw, G., Allen, J. H., Barnum, S., & Ellison, R. J.
(2008). Why Is Security a Software Issue?, Software
Security Engineering: A Guide for Project Managers.
The Addison-Wesley Software Security Series.
Moyon, F., Beckers, K., & Kleppe, S. (2018). Towards
Continuous Security Compliance in Agile Software
Development at Scale. International Workshop on
Rapid Continuous Software Engineering. Gothenburg,
Sweden: ACM/IEEE.
Nardi, P. M. (2014). Doing survey research : a guide to
quantitative methods. London: Paradigm Publishers.
Oppenheim, A. N. (2000). Questionnaire design,
interviewing and attitude measurement. Bloomsbury
Publishing.