Affiliation:
1. Kutahya Dumlupinar University
Abstract
AbstractThe implementation of software development strategies while developing a software is important for a project's roadmap. In traditional methods, the project is defined before the start of the project, delivery times and costs are determined. After each of the project development stages is completed, another development stage is started. However, communication is important in software projects developed by agile methods and processes are more flexible. It is possible to make innovation or changes at any time of the project. Scrum is an important strategy used for agile software development. Scrum is an important strategy used for agile software development. When the Scrum strategy is examined, it can be seen that agility and safety principles do not overlap at some points. At this point, models that allow security activities to cooperate with agile methods and work within the framework of Scrum come to the fore. In this study, studies to eliminate this incompatibility based on scientific evidence were analyzed. In this analysis, results of the Bibliometric Network Analysis and Co-Occurrence Network Construction for software development of the Scrum model were revealed. These results show that security processes have a place in the Scrum field. The inclusion of security in the process during the software development phase will enable a more robust system design in response to future security vulnerabilities.
Publisher
Research Square Platform LLC
Reference32 articles.
1. Protection poker: The new software security" game;Williams L;IEEE Security & Privacy,2010
2. Why and how is Scrum being adapted in practice: A systematic review;Hron M;Journal of Systems and Software,2022
3. QaSD: a quality-aware strategic dashboard for supporting decision makers in agile software development;López L;Science of Computer Programming,2021
4. Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers;Weir C;Software: Practice and Experience,2020
5. Continuous software security through security prioritisation meetings;Tøndel IA;Journal of Systems and Software,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Beyond Scrum;Advances in Logistics, Operations, and Management Science;2024-05-30