Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis

被引:4
作者
Khan, Rafiq Ahmad [1 ,2 ]
Akbar, Muhammad Azeem [3 ]
Rafi, Saima [4 ]
Almagrabi, Alaa Omran [5 ]
Alzahrani, Musaad [6 ]
机构
[1] Northwestern Polytech Univ, Sch Software, Xian, Peoples R China
[2] Univ Malakand, Dept Comp Sci & IT, Software Engn Res Grp, Khyber Pakhtunkhwa, Pakistan
[3] LUT Univ, Software Engn, Lappeenranta, Finland
[4] Univ Murcia, Dept Informat & Syst, Murcia, Spain
[5] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
[6] Al Baha Univ, Dept Comp Sci, Al Baha, Saudi Arabia
关键词
empirical study; global software development; interpretive structure modeling; requirement engineering; secure software development; security practices; SYSTEMATIC LITERATURE; MANAGEMENT; CLOUD;
D O I
10.1002/smr.2594
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Technological advancement makes the world a global village. Security is an evergreen and everlasting area, because of the continuous threat from Hackers and Crackers. The immense use of software systems has modernized human society in every aspect. Thus, it is crucial to devise new processes, techniques, and tools to support teams in the development of secure code from the early stages of the software development process, while potentially reducing the costs and shortening the time to market. Considering the significance of software security, it is important to consider the security practices from the early phase of the software development life cycle (SDLC), that is, requirements engineering (RE). Hence, this study aims to identify and categorize RE practices important to apply for secure software development (SSD) in a geographically distributed development environment. To study the RE practices concerning SSD, we conducted a questionnaire survey with industrial experts in the global software development (GSD) context.Furthermore, the interpretive structure modeling (ISM) approach was applied to evaluate the relationship between the RE security practice core categories. This paper identifies 70 practices and classifies them into 11 fundamental dimensions (categories) to assist GSD organizations in specifying the requirements for SSD. The ISM results show that the "Awareness of Secure Requirement Engineering (SRE)" category has the most decisive influence on the other 10 core categories of the identified RE security practices. With the help of empirical evidence and the ISM approach, this work attempts to identify potential security practices and to give a set of secure RE practices that can be used to improve the security of the software development process.
引用
收藏
页数:19
相关论文
共 58 条
[1]   A systematic review of search-based testing for non-functional system properties [J].
Afzal, Wasif ;
Torkar, Richard ;
Feldt, Robert .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (06) :957-976
[2]  
Agarwal A, 2017, Jindal Journal of Business Research, V6, P44, DOI [10.1177/2278682117700310, DOI 10.1177/2278682117700310]
[3]  
Akbar MA., 2020, APPL SOFT COMPUT, V95, P1
[4]   Toward successful DevSecOps in software development organizations: A decision-making framework [J].
Akbar, Muhammad Azeem ;
Smolander, Kari ;
Mahmood, Sajjad ;
Alsanad, Ahmed .
INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 147
[5]   Requirements Change Management Challenges of Global Software Development: An Empirical Investigation [J].
Akbar, Muhammad Azeem ;
Naveed, Wishal ;
Alsanad, Abeer Abdulaziz ;
Alsuwaidan, Lulwah ;
Alsanad, Ahmed ;
Gumaei, Abdu ;
Shafiq, Muhammad ;
Riaz, Muhammad Tanveer .
IEEE ACCESS, 2020, 8 :203070-203085
[6]   Success factors influencing requirements change management process in global software development [J].
Akbar, Muhammad Azeem ;
Sang, Jun ;
Nasrullah ;
Khan, Arif Ali ;
Mahmood, Sajjad ;
Qadri, Syed Furqan ;
Hu, Haibo ;
Xiang, Hong .
JOURNAL OF COMPUTER LANGUAGES, 2019, 51 :112-130
[7]   A Maturity Model for Secure Software Design: A Multivocal Study [J].
Al-Matouq, Hassan ;
Mahmood, Sajjad ;
Alshayeb, Mohammad ;
Niazi, Mahmood .
IEEE ACCESS, 2020, 8 :215758-215776
[8]   A model-driven framework for trusted computing based systems [J].
Alam, Masoom ;
Seifert, Jean-Pierre ;
Zhan, Xinwen .
11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, :75-+
[9]   Analyzing the interactions among factors affecting cloud adoption for software testing: a two-stage ISM-ANN approach [J].
Ali, Sikandar ;
Baseer, Samad ;
Abbasi, Irshad Ahmed ;
Alouffi, Bader ;
Alosaimi, Wael ;
Huang, Jiwei .
SOFT COMPUTING, 2022, 26 (16) :8047-8075
[10]   Practitioner's view of the success factors for software outsourcing partnership formation: an empirical exploration [J].
Ali, Sikandar ;
Abbasi, Irshad Ahmed ;
Mustafa, Elfatih Elmubarak ;
Wahid, Fazli ;
Huang, Jiwei .
EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (02)