ART of Review design security =0.85 
ART of Static code analysis=0.8 
Here, 
n=3 
AOM (Actual Agility of Model 
Table 1 ) = 0.68 
 By putting the values in (3) we get, 
Agility After Application of Security AAAS  
= [((0.91+0.85+0.8) ÷3) × 0.68] 
AAAS=0.58 
In this case the AAAS of XP becomes 0.58 
which is lower than its original value (0.68). The 
effect of including selected security activities in XP 
is visible in terms of reduced degree of agility. This 
represents the cost that one has to bear in terms of 
agility for including security practices.  
5 CONCLUSIONS 
The effect of including selected security activities 
can be seen in both process models. This leads to 
two conclusions. Firstly you are firm to use certain 
security practices, let us say as your prime factor in 
this case you can perform the calculations to see the 
effect of your decision on agility of different process 
models. Secondly, you are firm to use certain 
process model  and you are ready to adjust security 
practices keeping the degree of agility of process 
model as prime factor. Both of above-mentioned 
approaches can be handled by proposed method.  
6 FUTURE WORK 
This research can serve as one major parameter for 
selection of security practices. However, further 
study is required to learn about different values of 
same security activities in different process models. 
Second area of further work on this topic is to 
investigate other dimensions (for example time and 
monetary factors) that can help in selection of 
security activities. We will be looking into these 
dimensions along with Agility Reduction Tolerance 
of security activities in future in perspective of agile 
process models.
 
REFERENCES 
Alnatheer, Ahmed, Gravell, Andrew and Argles, & David. 
(2010). Agile Secuirty Issues. International 
Symposium on Empirical Software Engineeringl and 
Measurement. Italy: ACM/IEEE. 
Alreck, P.L., Settle, & R.B. (1995). The survey research 
handbook:guidelines and strategies for conducting a 
survey. IRWIN Professional Publishing. 
Ashraf, S., & Aftab, & S. (2017). IScrum: An improved 
scrum process model. Ashraf, S., & Aftab, S. (2017). 
IScrum: A International Journal of Modern Education 
and Computer Science (IJMECS), Ashraf, S., & Aftab, 
S. (2017). IScrum: An improved scrum process model. 
9(8), 16-24. 
Ayalew, T., Kidane, T., & Carlsson, B. (2013). 
Identification and Evaluation of Security Activities In 
Agile Projects. Springer-Verlag Berlin Heidelberg 
(pp. 139-153). Springer. 
Beck, & Kent. (2004). Extreme Programming Explained, 
Embrace Change. Addison-Wesley. 
Boström, Gustav, & et al. (2006). Extending XP practices 
to support security requirements engineering. 
International workshop on Software engineering for 
secure systems. ACM. 
Hossein keramati, & Mirian-Hosseinabadi, S.-H. (2008). 
Integrating Software development Security Activities 
with Agile Methodologies. International Conference 
on Computer Systems and Applications. Doha, Qatar: 
IEEE. 
Howard, M., & L. S. (2006). The Security Development 
Lifecycle - SDL: A Process for Developing 
Demonstrably More Secure Software. Microsoft Press. 
Jacobson. (2002). A resounding 'Yes' to agile processes - 
But also more. Cutter IT Journal, 15. 
Jon A. Krosnick, & Presser, S. (2010). Handbook of 
Survey Research. Emerald Group Publishing Limited. 
K., R., S., H., & V., L. (August, 2017). Busting a myth: 
Review of agile security engineering methods. In 
Proceedings of the 12th International Conference on 
Availability, Reliability and Security., 1-10. 
K.Beck, M. A. (2001). The Agile Manifesto. Retrieved 
from www.agie.alliance.org. 
Ken Schwaber, & Beedle, M. (2002). Agile Software 
Development with Scrum (Vol. 1). Upper Saddle 
River: Prentice Hall. 
Kravchenko, Elena, & E. W. (2017). Integrating Security 
in Agile projects. Belfast: OWASP. 
L. R. (1932). A Technique for the Measurement of 
Attitudes.  Archives of Psychology,  Vol. 22, No. 140, 
pp. 1-55. 
McGraw, G., Allen, J. H., Barnum, S., & Ellison, R. J. 
(2008).  Why Is Security a Software Issue?, Software 
Security Engineering: A Guide for Project Managers. 
The Addison-Wesley Software Security Series. 
Moyon, F., Beckers, K., & Kleppe, S. (2018). Towards 
Continuous Security Compliance in Agile Software 
Development at Scale. International Workshop on 
Rapid Continuous Software Engineering. Gothenburg, 
Sweden: ACM/IEEE. 
Nardi, P. M. (2014). Doing survey research : a guide to 
quantitative methods. London: Paradigm Publishers. 
Oppenheim, A. N. (2000). Questionnaire design, 
interviewing and attitude measurement. Bloomsbury 
Publishing.