Security concerns for contemporary development practices -: A case study

被引:0
|
作者
Tryfonas, T [1 ]
Kiountouzis, E [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, GR-10434 Athens, Greece
关键词
action research; contemporary IS development approaches; information systems security design; information systems security practices;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a case of application of an interpretive framework, which intends to formally integrate information systems security concerns within the information system's lifecycle. Aspects that are not normally taken under consideration, such as the involved stakeholders, the development approach and their implication-to security issues, are introduced in such a way to benefit and empower the IS security design process. In the case presented here, the framework is used to extract a powerful process model description focusing on security concerns, so as to enlighten the work of the security designer significantly earlier before the use of risk analysis and the construct of a security plan or policy.
引用
收藏
页码:421 / 435
页数:5
相关论文
共 50 条
  • [1] BP: Security Concerns and Best Practices for Automation of Software Deployment Processes An Industrial Case Study
    Mohan, Vaishnavi
    ben Othmane, Lotfi
    Kres, Andre
    [J]. 2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 21 - 28
  • [2] Embedding security practices in contemporary information systems development approaches
    Tryfonas, T.
    Kiountouzis, E.
    Poulymenakou, A.
    [J]. Information Management and Computer Security, 2001, 9 (04): : 183 - 197
  • [3] RFID Implementation and Security Concerns A Case Study of Pakistan
    Malik, Musab Umair
    Khan, Fahad Ahmed
    Malik, Farooq
    Ehsan, Nadeem
    Mirza, Ebtisam
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 36 - 40
  • [4] The concerns of prototypers and their mitigating practices: An industrial case-study
    Counsell, Steve
    Phalp, Keith
    Mendes, Emilia
    Geddes, Stella
    [J]. PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2006, 4034 : 166 - 176
  • [5] Ethnography in Contemporary Thai Cinematic Practices: A Case Study
    Pazzini-Paracciani, Loredana
    [J]. VISUAL ANTHROPOLOGY, 2022, 35 (02) : 138 - 157
  • [6] Cloud Computing Security: Concerns, Strategies and Best Practices
    Francis, Tina
    Vadivel, S.
    [J]. 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 205 - 207
  • [7] Integrating Security Concerns into Software Development
    Al-Fedaghi, Sabah
    Al-Kanderi, Fajer
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 235 - 247
  • [8] Integrating security concerns into software development
    [J]. Al-Fedaghi, S. (sabah@alfedaghi.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [9] Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation
    Zhang, Sonya
    Costa, Saree
    [J]. INTERNATIONAL JOURNAL OF MOBILE HUMAN COMPUTER INTERACTION, 2018, 10 (01) : 23 - 39
  • [10] Examining Information Security Concerns: Case Study of Malaysian Academic Setting
    Ismail, Zuraini
    Masrom, Maslin
    Sidek, Zailani Mohamad
    Hamzah, Dayang Suhana
    [J]. BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2, 2010, : 513 - 529