{"title":"Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs","authors":"Fatimah Alghamdi, Nermin Hamza, Moutasm Tamimi","doi":"10.1109/CAIS.2019.8769519","DOIUrl":null,"url":null,"abstract":"This paper reports security factors to custom-made software at SMEs from development perspectives. The primary purpose of this work is to support the In-house software development companies to understand the security issues are being addressed to deal with customer demands. It targets the requirement phase from the overall Software Development Life Cycle (SDLC) by conducting a systematic snapshot mapping in the literature addressing the security requirements in the period from 2000 to 2018. The data extraction process resulted in gathering 40 relevant papers. Primary, reviewed papers addressed classification factors based on management, development, organizational, and environmental perspectives. Secondary, it addressed classification governance issues, and security services including authorization, authentication, availability, confidentiality, and integrity. Our results revealed that project management issues have studied significantly. A large number of the studies are conducted at security management factors and adopting the authorization security service. This study presents a future trend based on a gap research forum that revealed after conducting the systematic mapping approach.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIS.2019.8769519","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper reports security factors to custom-made software at SMEs from development perspectives. The primary purpose of this work is to support the In-house software development companies to understand the security issues are being addressed to deal with customer demands. It targets the requirement phase from the overall Software Development Life Cycle (SDLC) by conducting a systematic snapshot mapping in the literature addressing the security requirements in the period from 2000 to 2018. The data extraction process resulted in gathering 40 relevant papers. Primary, reviewed papers addressed classification factors based on management, development, organizational, and environmental perspectives. Secondary, it addressed classification governance issues, and security services including authorization, authentication, availability, confidentiality, and integrity. Our results revealed that project management issues have studied significantly. A large number of the studies are conducted at security management factors and adopting the authorization security service. This study presents a future trend based on a gap research forum that revealed after conducting the systematic mapping approach.