{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T20:29:01Z","timestamp":1774384141313,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032214225","type":"print"},{"value":"9783032214232","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-21423-2_8","type":"book-chapter","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:55:48Z","timestamp":1774371348000},"page":"110-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Under Pressure: How Agile Teams Experience and\u00a0Manage Security Requirements"],"prefix":"10.1007","author":[{"given":"Dahlia Vingtoft","family":"Andreasen","sequence":"first","affiliation":[]},{"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,25]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Beznosov, K., Kruchten, P.: Towards agile security assurance. In: Proc. of the 2004 workshop on New security paradigms, pp. 47\u201354","DOI":"10.1145\/1065907.1066034"},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA472363","volume-title":"Software security assurance: a state-of-art report (sar)","author":"KM Goertzel","year":"2007","unstructured":"Goertzel, K.M., et al.: Software security assurance: a state-of-art report (sar). Tech. Rep, IATAC HERNDON VA (2007)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bartsch, S.: Practitioners\u2019 perspectives on security in agile development. In: 6th Intl Conference on Availability, Reliability and Security. IEEE , pp. 479\u2013484 (2011)","DOI":"10.1109\/ARES.2011.82"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Daneva, M., Wang, C.: Security requirements engineering in the agile era: how does it work in practice? In: IEEE 1st International Workshop On Quality Requirements In Agile Projects (QuaRAP). IEEE 2018, pp. 10\u201313 (2018)","DOI":"10.1109\/QuaRAP.2018.00008"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Inayat, I., Salim, S.\u00a0S., Marczak, S., Daneva, M., Shamshirband, S.: A systematic literature review on agile requirements engineering practices and challenges. Comput. Human Behav, 915\u2013929 (2015)","DOI":"10.1016\/j.chb.2014.10.046"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"T\u00fcrpe, S.: The trouble with security requirements. In: IEEE 25th International Requirements Engineering Conference (RE). IEEE 2017, pp. 122\u2013133 (2017)","DOI":"10.1109\/RE.2017.13"},{"key":"8_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106488","volume":"131","author":"K Rindell","year":"2021","unstructured":"Rindell, K., Ruohonen, J., Holvitie, J., Hyrynsalmi, S., Lepp\u00e4nen, V.: Security in agile software development: a practitioner survey. Inf. Softw. Technol. 131, 106488 (2021)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Jarz\u0119bowicz, A., Weichbroth, P.: A qualitative study on non-functional requirements in agile software development. IEEE Access, vol.\u00a09, pp. 40\u00a0458\u201340\u00a0475 (2021)","DOI":"10.1109\/ACCESS.2021.3064424"},{"key":"8_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.106225","volume":"123","author":"W Behutiye","year":"2020","unstructured":"Behutiye, W., et al.: Management of quality requirements in agile and rapid software development: a systematic mapping study. Inf. Softw. Technol. 123, 106225 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102744","volume":"118","author":"IA T\u00f8ndel","year":"2022","unstructured":"T\u00f8ndel, I.A., Cruzes, D.S., Jaatun, M.G., Sindre, G.: Influencing the security prioritisation of an agile software development project. Comput. Secur. 118, 102744 (2022)","journal-title":"Comput. Secur."},{"issue":"5","key":"8_CR11","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/j.1365-2575.2007.00259.x","volume":"20","author":"B Ramesh","year":"2010","unstructured":"Ramesh, B., Cao, L., Baskerville, R.: Agile requirements engineering practices and challenges: an empirical study. Inf. Syst. J. 20(5), 449\u2013480 (2010)","journal-title":"Inf. Syst. J."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"van\u00a0der Heijden, A., Broasca, C., Serebrenik, A.: An empirical perspective on security challenges in large-scale agile software development In: Proceedings of the 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement , pp. 1\u20134 (2018)","DOI":"10.1145\/3239235.3267426"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"N\u00e4gele, S., Schenk, N., Matthes, F.: The current state of security governance and compliance in large-scale agile development: a systematic literature review and interview study. In: CBI. IEEE, pp. 1\u201310 (2023)","DOI":"10.1109\/CBI58679.2023.10187439"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Thool, A., Brown, C.: Securing agile: assessing the impact of security activities on agile development. In: Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, pp. 668\u2013678 (2024)","DOI":"10.1145\/3661167.3661280"},{"issue":"1","key":"8_CR15","first-page":"15","volume":"3","author":"D Mougouei","year":"2013","unstructured":"Mougouei, D., Sani, N.F.M., Almasi, M.M.: S-scrum: a secure methodology for agile development of web services. World Comput. Sci. Inf. Tech. J. (WCSIT) 3(1), 15\u201319 (2013)","journal-title":"World Comput. Sci. Inf. Tech. J. (WCSIT)"},{"key":"8_CR16","unstructured":"Pohl, C., Hof, H.-J.: Secure scrum: development of secure software with scrum. arXiv preprint arXiv:1507.02992 (2015)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Bostr\u00f6m, G., W\u00e4yrynen, J., Bod\u00e9n, M., Beznosov, K., P.\u00a0Kruchten.: Extending xp practices to support security requirements engineering. In: Proc. of the International Workshop on Software Engineering For Secure Systems, pp. 11\u201318 (2006)","DOI":"10.1145\/1137627.1137631"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Baca, D., Boldt, M., Carlsson, B., Jacobsson, A.: A novel security-enhanced agile software development process applied in an industrial setting. In: 10th Intnl Conference on Availability, Reliability and Security. IEEE, pp. 11\u201319 (2015)","DOI":"10.1109\/ARES.2015.45"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Villamizar, H., Kalinowski, M., Viana, M., Fern\u00e1ndez, D.\u00a0M.: A systematic mapping study on security in agile requirements engineering. In: 44th Euromicro conf on software engineering and advanced applications. IEEE, pp. 454\u2013461 (2018)","DOI":"10.1109\/SEAA.2018.00080"},{"issue":"7","key":"8_CR20","doi-asserted-by":"publisher","first-page":"4578","DOI":"10.3390\/app13074578","volume":"13","author":"Y Vald\u00e9s-Rodr\u00edguez","year":"2023","unstructured":"Vald\u00e9s-Rodr\u00edguez, Y., Hochstetter-Diez, J., D\u00edaz-Arancibia, J., Cadena-Mart\u00ednez, R.: Towards the integration of security practices in agile software development: a systematic mapping review. Appl. Sci. 13(7), 4578 (2023)","journal-title":"Appl. Sci."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.\u00a0A., Jaatun, M.\u00a0G.: Towards a conceptual framework for security requirements work in agile software development. In: Research Anthology on Agile Software, Software Development, and Testing. IGI Global, pp. 247\u2013279 (2022)","DOI":"10.4018\/978-1-6684-3702-5.ch012"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Terpstra, E., Daneva, M., Wang, C.: Agile practitioners\u2019 understanding of security requirements: insights from a grounded theory analysis. In: 25th international requirements engineering conference workshops (REW). IEEE, pp. 439\u2013442 (2017)","DOI":"10.1109\/REW.2017.54"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Oyetoyan, T.\u00a0D., Cruzes, D.\u00a0S., Jaatun, M.\u00a0G.: An empirical study on the relationship between software security skills, usage and training needs in agile settings. In: 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, pp. 548\u2013555 (2016)","DOI":"10.1109\/ARES.2016.103"},{"issue":"1","key":"8_CR24","doi-asserted-by":"publisher","first-page":"801","DOI":"10.3390\/su15010801","volume":"15","author":"A Miheli\u010d","year":"2023","unstructured":"Miheli\u010d, A., Vrhovec, S., Hovelja, T.: Agile development of secure software for small and medium-sized enterprises. Sustainability 15(1), 801 (2023)","journal-title":"Sustainability"},{"issue":"3","key":"8_CR25","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/17439760.2016.1262613","volume":"12","author":"V Clarke","year":"2017","unstructured":"Clarke, V., Braun, V.: Thematic analysis. J. Posit. Psychol. 12(3), 297\u2013298 (2017)","journal-title":"J. Posit. Psychol."},{"issue":"3","key":"8_CR26","first-page":"293","volume":"25","author":"A Armenakis","year":"1999","unstructured":"Armenakis, A., Bedeian, A.: Organizational change: a review of theory and research in the 1990s. J. Manag. 25(3), 293\u2013315 (1999)","journal-title":"J. Manag."}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-21423-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:55:52Z","timestamp":1774371352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-21423-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032214225","9783032214232"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-21423-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"25 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The interview guides and the code book used for analysis are made available on\n                      \n                      .","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability Statement"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2026.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}