{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:41:54Z","timestamp":1766580114138,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"King Fahd University of Petroleum and Minerals"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,18]]},"DOI":"10.1145\/3661167.3661284","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T12:24:25Z","timestamp":1718367865000},"page":"652-661","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Challenges in Developing Secure Software within Agile Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3989-5131","authenticated-orcid":false,"given":"Reem","family":"Alshareef","sequence":"first","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia and \rComputer Information Systems Department, Imam Abdulrahman Bin Faisal University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5932-8532","authenticated-orcid":false,"given":"Asra Sulaiman","family":"Alshabib","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia and \rDepartment of Computer Science, Imam Abdulrahman Bin Faisal University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0175-5862","authenticated-orcid":false,"given":"Noor","family":"Alakkas","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia and \rDepartment of Computer Science, Imam Abdulrahman Bin Faisal University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7318-7644","authenticated-orcid":false,"given":"Mahmood","family":"Niazi","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Saudi Arabia and \rInterdisciplinary Research Centre for Intelligent Secure Systems, King Fahd University of Petroleum and Minerals, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.69"},{"key":"e_1_3_2_1_2_1","volume-title":"Security compliance in agile software development: a systematic mapping study","author":"Moy\u00b4on F.","year":"2020","unstructured":"F. Moy\u00b4on, P. Almeida, D. Riofr\u00b4\u0131o, D. Mendez, and M. Kalinowski, \u201cSecurity compliance in agile software development: a systematic mapping study,\u201d in 2020 46th"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSE.2016010102"},{"key":"e_1_3_2_1_4_1","volume-title":"Information security in agile software development projects: a critical success factor perspective","author":"Newton N.","year":"2019","unstructured":"N. Newton, C. Anslow, and A. Drechsler, \u201cInformation security in agile software development projects: a critical success factor perspective,\u201d 2019."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08169-9_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234189"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"49","article-title":"A review of security integration technique in agile software development","volume":"7","author":"Khaim R.","year":"2016","unstructured":"R. Khaim, S. Naz, F. Abbas, N. Iqbal, M. Hamayun, and R. Pakistan, \u201cA review of security integration technique in agile software development,\u201d Int. J. Softw. Eng. Appl, vol. 7, no. 3, pp. 49\u201368, 2016.","journal-title":"Int. J. Softw. Eng. Appl"},{"key":"e_1_3_2_1_8_1","volume-title":"Agile and secure software development: An unfinished story","author":"Bishop D.","year":"2019","unstructured":"D. Bishop and P. Rowland, \u201cAgile and secure software development: An unfinished story,\u201d 2019."},{"volume-title":"Guidelines for performing systematic literature reviews in software engineering","year":"2007","key":"e_1_3_2_1_9_1","unstructured":"Keele , \u201cGuidelines for performing systematic literature reviews in software engineering,\u201d 2007."},{"volume-title":"Better systematic review management","year":"2023","key":"e_1_3_2_1_10_1","unstructured":"N.A \u201cBetter systematic review management,\u201d May 2023. [Online]. Available: https:\/\/www.covidence.org"},{"key":"e_1_3_2_1_11_1","unstructured":"Anne-WilHarzing \u201cPublish or perish.\u201d [Online]. Available: https:\/\/harzing.com\/resources\/publish-or-peris."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. 12th World Multi-Conf. Syst., Cybern., Informat.","author":"Pazos-Revilla M.","year":"2008","unstructured":"M. Pazos-Revilla and A. Siraj, \u201cTools and techniques for sse-cmm implementation,\u201d in Proc. 12th World Multi-Conf. Syst., Cybern., Informat., 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2016.028"},{"key":"e_1_3_2_1_14_1","volume-title":"Misalignment challenges when integrating security requirements into mobile banking applica- tion development","author":"Machiridza M.","year":"2016","unstructured":". M. Machiridza, \u201cMisalignment challenges when integrating security requirements into mobile banking applica- tion development,\u201d 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102744"},{"key":"e_1_3_2_1_16_1","first-page":"287","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE","author":"Angermeir F.","year":"2021","unstructured":"F. Angermeir, M. Voggenreiter, F. Moy\u00b4on, and D. Mendez, \u201cEnterprisedriven open source software: a case study on security automation,\u201d in 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2021, pp. 278\u2013287."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111090"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2018.00023"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64148-1_5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8885144"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249631"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSE.2017100101"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTIM.2015.7224607"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3120459.3120471"},{"key":"e_1_3_2_1_25_1","first-page":"34","article-title":"Managing security work in scrum: Tensions and challenges","volume":"2017","author":"T\u00a8urpe S.","year":"2017","unstructured":"S. T\u00a8urpe and A. Poller, \u201cManaging security work in scrum: Tensions and challenges.\u201d SecSE ESORICS, vol. 2017, pp. 34\u201349, 2017.","journal-title":"SecSE ESORICS"},{"key":"e_1_3_2_1_26_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Tuladhar A.","year":"2021","unstructured":"A. Tuladhar, D. Lende, J. Ligatti, and X. Ou, \u201cAn analysis of the role of situated learning in starting a security culture in a software company,\u201d in Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021."}],"event":{"name":"EASE 2024: 28th International Conference on Evaluation and Assessment in Software Engineering","acronym":"EASE 2024","location":"Salerno Italy"},"container-title":["Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661167.3661284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3661167.3661284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:17:15Z","timestamp":1755861435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661167.3661284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":26,"alternative-id":["10.1145\/3661167.3661284","10.1145\/3661167"],"URL":"https:\/\/doi.org\/10.1145\/3661167.3661284","relation":{},"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"2024-06-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}