Software Development Team Dynamics: Control, Coordination, and Secure Software

被引:0
|
作者
Ayaburi, Emmanuel W. [1 ]
Talebi, Nasim [1 ]
机构
[1] Univ Texas San Antonio, San Antonio, TX 78249 USA
来源
AMCIS 2017 PROCEEDINGS | 2017年
关键词
Secure-software; coordination; control; awareness and maturity; SYSTEMS-DEVELOPMENT; PERFORMANCE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In secure software has resulted of millions of dollars of company's revenue as complex organizational systems are often software intensive. Researchers are still interested in the impact of the people involved, the process used and the project characteristics. This study looks at the security awareness and maturity level of those involved in the development process coupled with the management of the process to identify factors that lead to enhanced secure software development. Following a survey of prior literature, it is hypothesized that software development team members' security awareness and maturity affect the design of software in a distributed context. Due to the nature of work of distributed team members, the relationship between team security awareness and maturity coordination on secure software design are also posited to be impacted by control types and coordination mechanisms. We contribute to literature by expanding the understanding of the process of creating secure software.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Influence of geographic dispersion on control and coordination for management of software development projects
    Sharma, R
    Krishna, S
    INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 865 - 866
  • [42] Secure Software
    McGregor, John D.
    JOURNAL OF OBJECT TECHNOLOGY, 2005, 4 (04): : 33 - 42
  • [43] Adaption of Integrated Secure Guide for Secure Software Development Lifecycle
    Lee, Ki-Hyun
    Park, Young B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 145 - 154
  • [44] Adaption of a Secure Software Development Methodology for Secure Engineering Design
    Von Solms, Sune
    Futcher, Lynn A.
    IEEE ACCESS, 2020, 8 : 125630 - 125637
  • [45] Case Base for Secure Software Development Using Software Security Knowledge Base
    Hazeyama, Atsuo
    Saito, Masahito
    Yoshioka, Nobukazu
    Kumagai, Azusa
    Kobashi, Takanori
    Washizaki, Hironori
    Kaiya, Haruhiko
    Okubo, Takao
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 97 - 103
  • [46] The software architect -: and the software architecture team
    Kruchten, P
    SOFTWARE ARCHITECTURE, 1999, 12 : 565 - 583
  • [47] Secure Software Configuration Management Processes for nuclear safety software development environment
    Chou, I-Hsin
    ANNALS OF NUCLEAR ENERGY, 2011, 38 (10) : 2174 - 2179
  • [48] Systematic Mapping of the Literature on Secure Software Development
    Nina, Hernan
    Pow-Sang, Jose Antonio
    Villavicencio, Monica
    IEEE ACCESS, 2021, 9 : 36852 - 36867
  • [49] The ISDF Framework: Towards Secure Software Development
    Alkussayer, Abdulaziz
    Allen, William H.
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2010, 6 (01): : 91 - 106
  • [50] Secure Networked Control via Software Rejuvenation
    Griffioen, Paul
    Romagnoli, Raffaele
    Krogh, Bruce H.
    Sinopoli, Bruno
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 3878 - 3884