{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:42:39Z","timestamp":1766580159486,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,16]]},"DOI":"10.1145\/3643690.3648241","type":"proceedings-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T15:41:40Z","timestamp":1724686900000},"page":"56-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Practices in Agile Software Development: A Mapping Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9991-2513","authenticated-orcid":false,"given":"Alejandra","family":"Selva-Mora","sequence":"first","affiliation":[{"name":"Universidad de Costa Rica, San Jose, Costa Rica"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5393-2763","authenticated-orcid":false,"given":"Christian","family":"Quesada-L\u00f3pez","sequence":"additional","affiliation":[{"name":"Universidad de Costa Rica, San Jose, Costa Rica"}]}],"member":"320","published-online":{"date-parts":[[2024,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Agile Alliance \"Agile Manifesto 2019 \" 2019 p. 1 2019 [Online]. Available: https:\/\/www.agilealliance.org\/wp-content\/uploads\/2019\/09\/agile-manifesto-download-2019.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA52016.2021.9478254"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11283-1"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"1st Int. Work. Rapid Contin. Softw. Eng.","author":"Fitzgerald B.","year":"2014","unstructured":"B. Fitzgerald and K.-J. Stol, \"Continuous Software Engineering and Beyond: Trends and Challenges Categories and Subject Descriptors,\" RCoSE 2014 Proc. 1st Int. Work. Rapid Contin. Softw. Eng., pp. 1--9, 2014."},{"key":"e_1_3_2_1_5_1","unstructured":"HPE \"Application Security and DevOps \" 2016 [Online]. Available: https:\/\/techbeacon.com\/sites\/default\/files\/gated_asset\/hpe-application-security-and-devops-report.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106488"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971000"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3072"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234187"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597716.2597728"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00037"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-6313-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2019.00020"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2018.00023"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.69"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA51224.2020.00073"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-020-01542-z"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111477"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8111218"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2019.8907213"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MySEC.2011.6140708"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2008.4493611"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2017.54"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/APWCCSE.2014.7053838"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464385.3464746"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101967"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340337"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00018"},{"key":"e_1_3_2_1_30_1","first-page":"236","article-title":"Securing scrum for VAHTI","volume":"1525","author":"Rindell K.","year":"2015","unstructured":"K. Rindell, S. Hyrynsalmi, and V. Lepp\u00e4nen, \"Securing scrum for VAHTI,\" CEUR Workshop Proc., vol. 1525, pp. 236--250, 2015.","journal-title":"CEUR Workshop Proc."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AgileIndia.2012.9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.73"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3484399.3484403"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_29"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857218.2857225"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2298011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176727"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21297-1_12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADC.2005.11"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2005.329"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-020-00338-w"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2019.00050"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.85"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.45"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW.2019.00028"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC49727.2020.00026"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3103170"},{"key":"e_1_3_2_1_48_1","unstructured":"L. Williams \"Secure Software Lifecycle Knowledge Area (Draft for Comment) \" Cyber Secur. Body Knowl. 2019 [Online]. Available: https:\/\/www.cybok.org\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3267426"}],"event":{"name":"IWSiB '24: 7th ACM\/IEEE International Workshop on Software-intensive Business","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"location":"Lisbon Portugal","acronym":"IWSiB '24"},"container-title":["Proceedings of the 7th ACM\/IEEE International Workshop on Software-intensive Business"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643690.3648241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643690.3648241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:20Z","timestamp":1750291460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643690.3648241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,16]]},"references-count":49,"alternative-id":["10.1145\/3643690.3648241","10.1145\/3643690"],"URL":"https:\/\/doi.org\/10.1145\/3643690.3648241","relation":{},"subject":[],"published":{"date-parts":[[2024,4,16]]},"assertion":[{"value":"2024-08-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}