{"id":"https://openalex.org/W4386246839","doi":"https://doi.org/10.1109/icit58056.2023.10226018","title":"Security Challenges Review in Agile and DevOps Practices","display_name":"Security Challenges Review in Agile and DevOps Practices","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4386246839","doi":"https://doi.org/10.1109/icit58056.2023.10226018"},"language":"en","primary_location":{"id":"doi:10.1109/icit58056.2023.10226018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076363726","display_name":"Suha Afaneh","orcid":"https://orcid.org/0009-0009-0126-7157"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Suha Afaneh","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarka,Jordan","Department of Cybersecurity, Zarqa University, Zarka, Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarka,Jordan","institution_ids":["https://openalex.org/I153687341"]},{"raw_affiliation_string":"Department of Cybersecurity, Zarqa University, Zarka, Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080292859","display_name":"Mohammad Rasmi Al-Mousa","orcid":"https://orcid.org/0000-0002-5176-0910"},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Rasmi Al-Mousa","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarka,Jordan","Department of Cybersecurity, Zarqa University, Zarka, Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarka,Jordan","institution_ids":["https://openalex.org/I153687341"]},{"raw_affiliation_string":"Department of Cybersecurity, Zarqa University, Zarka, Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092814948","display_name":"Hilal Shrif Al-hamid","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hilal Shrif Al-hamid","raw_affiliation_strings":["Zarqa University,Software Engineering,Zarqa,Jordan","Software Engineering, Zarqa University, Zarqa, Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Software Engineering,Zarqa,Jordan","institution_ids":["https://openalex.org/I153687341"]},{"raw_affiliation_string":"Software Engineering, Zarqa University, Zarqa, Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092814949","display_name":"Bara'h Suliman AL-Awasa","orcid":null},"institutions":[{"id":"https://openalex.org/I153687341","display_name":"Zarqa University","ror":"https://ror.org/01wf1es90","country_code":"JO","type":"education","lineage":["https://openalex.org/I153687341"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bara'h Suliman AL-Awasa","raw_affiliation_strings":["Zarqa University,Department of Cybersecurity,Zarka,Jordan","Department of Cybersecurity, Zarqa University, Zarka, Jordan"],"affiliations":[{"raw_affiliation_string":"Zarqa University,Department of Cybersecurity,Zarka,Jordan","institution_ids":["https://openalex.org/I153687341"]},{"raw_affiliation_string":"Department of Cybersecurity, Zarqa University, Zarka, Jordan","institution_ids":["https://openalex.org/I153687341"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015041914","display_name":"Mohammad Alia","orcid":"https://orcid.org/0000-0002-1821-7756"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alia","raw_affiliation_strings":["Al-zaytoonah University of Amman,Cybersecurity department,Jordan","Cybersecurity department, Al-zaytoonah University of Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-zaytoonah University of Amman,Cybersecurity department,Jordan","institution_ids":["https://openalex.org/I145019703"]},{"raw_affiliation_string":"Cybersecurity department, Al-zaytoonah University of Amman, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032446334","display_name":"Hani Almimi","orcid":"https://orcid.org/0000-0003-2900-9925"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hani Almimi","raw_affiliation_strings":["Al-zaytoonah University of Amman,Cybersecurity department,Jordan","Cybersecurity department, Al-zaytoonah University of Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-zaytoonah University of Amman,Cybersecurity department,Jordan","institution_ids":["https://openalex.org/I145019703"]},{"raw_affiliation_string":"Cybersecurity department, Al-zaytoonah University of Amman, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000788022","display_name":"Ahmad AA Alkhatib","orcid":"https://orcid.org/0000-0002-1369-1184"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad A Alkhatib","raw_affiliation_strings":["Al-zaytoonah University of Amman,Cybersecurity department,Jordan","Cybersecurity department, Al-zaytoonah University of Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-zaytoonah University of Amman,Cybersecurity department,Jordan","institution_ids":["https://openalex.org/I145019703"]},{"raw_affiliation_string":"Cybersecurity department, Al-zaytoonah University of Amman, Jordan","institution_ids":["https://openalex.org/I145019703"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5076363726"],"corresponding_institution_ids":["https://openalex.org/I153687341"],"apc_list":null,"apc_paid":null,"fwci":7.3306,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.97191409,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9599000215530396,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9366999864578247,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/devops","display_name":"DevOps","score":0.971038818359375},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.8615500330924988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5779399871826172},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5580191016197205},{"id":"https://openalex.org/keywords/lean-software-development","display_name":"Lean software development","score":0.478822261095047},{"id":"https://openalex.org/keywords/agile-unified-process","display_name":"Agile Unified Process","score":0.41845160722732544},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.41828101873397827},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4067786931991577},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4053988456726074},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.368995726108551},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3631807267665863},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.3101823925971985},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.28844499588012695},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2662994861602783},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2600443363189697},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.24790599942207336},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23620176315307617},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.22914469242095947},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.21710661053657532},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15534430742263794},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.14859002828598022},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1425982117652893}],"concepts":[{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.971038818359375},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.8615500330924988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5779399871826172},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5580191016197205},{"id":"https://openalex.org/C199561411","wikidata":"https://www.wikidata.org/wiki/Q2665555","display_name":"Lean software development","level":5,"score":0.478822261095047},{"id":"https://openalex.org/C87813535","wikidata":"https://www.wikidata.org/wiki/Q956418","display_name":"Agile Unified Process","level":5,"score":0.41845160722732544},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.41828101873397827},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4067786931991577},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4053988456726074},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.368995726108551},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3631807267665863},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.3101823925971985},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.28844499588012695},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2662994861602783},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2600443363189697},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.24790599942207336},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23620176315307617},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.22914469242095947},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21710661053657532},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15534430742263794},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.14859002828598022},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1425982117652893},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icit58056.2023.10226018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4699999988079071,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1592034869","https://openalex.org/W1759083992","https://openalex.org/W1966556852","https://openalex.org/W1968165445","https://openalex.org/W1980232100","https://openalex.org/W2048782116","https://openalex.org/W2105481302","https://openalex.org/W2109026747","https://openalex.org/W2119786457","https://openalex.org/W2128412750","https://openalex.org/W2413050844","https://openalex.org/W2560152169","https://openalex.org/W2581988150","https://openalex.org/W2743819427","https://openalex.org/W2934017287","https://openalex.org/W2966008409","https://openalex.org/W2996928366","https://openalex.org/W3086980192","https://openalex.org/W3118423640","https://openalex.org/W3157574409","https://openalex.org/W3184573963","https://openalex.org/W3185067500","https://openalex.org/W3186377741","https://openalex.org/W4206718520","https://openalex.org/W4225795225","https://openalex.org/W4230618248","https://openalex.org/W4293114445","https://openalex.org/W4313484864","https://openalex.org/W4360777615"],"related_works":["https://openalex.org/W4242507731","https://openalex.org/W2007879862","https://openalex.org/W2742418299","https://openalex.org/W2503060256","https://openalex.org/W2887439684","https://openalex.org/W4320039727","https://openalex.org/W2744284456","https://openalex.org/W2253944789","https://openalex.org/W2120086576","https://openalex.org/W2159825400"],"abstract_inverted_index":{"Agile":[0,26,68],"and":[1,20,34,43,59,69,94,105,118,133],"DevOps":[2,49,70,119],"methodologies":[3],"are":[4],"becoming":[5],"increasingly":[6],"popular":[7],"in":[8,31,37,116],"software":[9,17],"development,":[10,32],"as":[11],"they":[12,23],"offer":[13],"many":[14],"benefits":[15],"to":[16,83,100],"development":[18,76,93],"teams":[19],"the":[21,40,46,75,79,85,125],"organizations":[22],"work":[24],"for.":[25],"methods":[27],"depend":[28],"on":[29,39],"speed":[30],"repetition,":[33],"an":[35],"increase":[36,103],"focus":[38],"main":[41],"characteristics":[42],"functions":[44],"of":[45,67,87,129],"system.":[47],"The":[48],"approach":[50],"aims":[51],"at":[52],"continuous":[53,55,57,134],"integration,":[54],"delivery,":[56],"improvement,":[58],"faster":[60],"feedback.":[61],"Security":[62],"is":[63],"a":[64],"critical":[65],"component":[66],"methodologies.":[71],"Integrating":[72],"security":[73,88,95,101,113,132],"into":[74],"process":[77],"from":[78],"outset":[80],"can":[81],"help":[82],"reduce":[84],"risk":[86],"vulnerabilities,":[89],"improve":[90],"collaboration":[91],"between":[92],"teams,":[96],"enable":[97],"rapid":[98],"response":[99],"incidents,":[102],"automation,":[104],"ensure":[106],"compliance":[107],"with":[108],"regulatory":[109],"requirements.":[110],"In":[111],"conclusion,":[112],"has":[114],"challenges":[115,128],"agile":[117],"approaches,":[120],"so":[121],"this":[122],"paper":[123],"discusses":[124],"most":[126],"important":[127],"combining":[130],"ensuring":[131],"development.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":1}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
