Abstract | ||
---|---|---|
Developing and designing security systems and subsystems is a vital component of the ISD process, yet often is not considered until after the software has been developed. This reflects the low value that ISD places upon security. Some researchers argue that the type of development methodology used by developers is a reflection of their values. In this chapter we investigate five of the most common ISD methodologies described in the ISD literature, and also examine to what extent each of these methodologies incorporates security as part of the development process. This chapter will also show findings of a study that measured the values of potential developers from Ireland and various other countries around the world, to see if they value security. The study showed that current ISD methodologies are out-of-step with developers' attitudes in terms of information systems security (ISS). |
Year | DOI | Venue |
---|---|---|
2007 | 10.1007/978-0-387-78578-3_12 | INFORMATION SYSTEMS DEVELOPMENT: CHALLENGES IN PRACTICE, THEORY AND EDUCATION, VOLS 1AND 2 |
Field | DocType | Citations |
Information systems security,Computer science,Software,Instructional design,Process management | Conference | 0 |
PageRank | References | Authors |
0.34 | 15 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Amanda Freeman | 1 | 0 | 0.34 |
Larry Stapleton | 2 | 24 | 6.81 |
Gabriel J. Byrne | 3 | 5 | 0.90 |