{"id":"https://openalex.org/W6944088676","doi":"https://doi.org/10.18420/se2019-40","title":"How is security testing done in agile teams? A cross-case analysis of four software teams","display_name":"How is security testing done in agile teams? A cross-case analysis of four software teams","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W6944088676","doi":"https://doi.org/10.18420/se2019-40"},"language":"en","primary_location":{"id":"doi:10.18420/se2019-40","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2019-40","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/se2019-40","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Cruzes, Daniela S.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cruzes, Daniela S.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Felderer, Michael","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Felderer, Michael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Oyetoyan, Tosin Daniel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oyetoyan, Tosin Daniel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Gander, Matthias","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gander, Matthias","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Pekaric, Irdin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pekaric, Irdin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3392,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75905361,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.00559999980032444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.7944999933242798},{"id":"https://openalex.org/keywords/lean-software-development","display_name":"Lean software development","score":0.5401999950408936},{"id":"https://openalex.org/keywords/agile-usability-engineering","display_name":"Agile usability engineering","score":0.4571000039577484},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44940000772476196},{"id":"https://openalex.org/keywords/agile-unified-process","display_name":"Agile Unified Process","score":0.4480000138282776},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.37860000133514404},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.37389999628067017}],"concepts":[{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.7944999933242798},{"id":"https://openalex.org/C199561411","wikidata":"https://www.wikidata.org/wiki/Q2665555","display_name":"Lean software development","level":5,"score":0.5401999950408936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49900001287460327},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.46059998869895935},{"id":"https://openalex.org/C36837802","wikidata":"https://www.wikidata.org/wiki/Q17011481","display_name":"Agile usability engineering","level":5,"score":0.4571000039577484},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44940000772476196},{"id":"https://openalex.org/C87813535","wikidata":"https://www.wikidata.org/wiki/Q956418","display_name":"Agile Unified Process","level":5,"score":0.4480000138282776},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.37860000133514404},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.37389999628067017},{"id":"https://openalex.org/C2984328558","wikidata":"https://www.wikidata.org/wiki/Q188522","display_name":"Software testing","level":3,"score":0.35600000619888306},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3531000018119812},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3093000054359436},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.30399999022483826},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.29989999532699585},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.28690001368522644},{"id":"https://openalex.org/C170291536","wikidata":"https://www.wikidata.org/wiki/Q5422448","display_name":"Extreme programming practices","level":5,"score":0.2831999957561493},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.2540000081062317},{"id":"https://openalex.org/C39890963","wikidata":"https://www.wikidata.org/wiki/Q1702721","display_name":"Personal software process","level":5,"score":0.25380000472068787},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/se2019-40","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2019-40","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/se2019-40","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2019-40","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"summary":[1],"refers":[2],"to":[3],"the":[4,32,35],"paper":[5,23,30],"\u2019How":[6],"is":[7,55],"security":[8,53],"testing":[9,54],"done":[10,56],"in":[11,31,57],"agile":[12,58],"teams?":[13],"A":[14],"cross-case":[15],"analysis":[16],"of":[17,34],"four":[18],"software":[19],"teams\u2019":[20],"[Cr17].":[21],"The":[22],"was":[24],"published":[25],"as":[26],"a":[27,47],"full":[28],"research":[29],"proceedings":[33],"18th":[36],"International":[37],"Conference":[38],"on":[39,51],"Agile":[40],"Software":[41],"Development":[42],"(XP":[43],"2017).":[44],"It":[45],"presents":[46],"multiple":[48],"case":[49],"study":[50],"how":[52],"teams.":[59]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
