{"id":29556,"date":"2024-02-28T00:39:50","date_gmt":"2024-02-28T00:39:50","guid":{"rendered":"https:\/\/academicwritersbay.com\/writings\/using-the-readings-or-additional-literature-research-one-software-security-model-and-describe-its-features-and-applications-that-may-be-used-in-an-organization-evaluate-the-mo\/"},"modified":"2024-02-28T00:39:50","modified_gmt":"2024-02-28T00:39:50","slug":"using-the-readings-or-additional-literature-research-one-software-security-model-and-describe-its-features-and-applications-that-may-be-used-in-an-organization-evaluate-the-mo","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/writings\/using-the-readings-or-additional-literature-research-one-software-security-model-and-describe-its-features-and-applications-that-may-be-used-in-an-organization-evaluate-the-mo\/","title":{"rendered":"Using the readings or additional literature, research one software security model and describe its features and applications that may be used in an organization. Evaluate the mo"},"content":{"rendered":"<div class='css-tib94n'>\n<div class='css-1lys3v9'>\n<div>\n<p>\u00a0Using the readings or additional literature, research one software security model and describe its features and applications that may be used in an organization. Evaluate the model.\u00a0In which kind of organization would it would be useful? Assess whether this model could be a good candidate for additional research. For example, where might this model be applied, tested, or expanded?\u00a0<\/p>\n<p><strong>The are articles BELOW \u00a0are from my reading list optional not required but would be great if one could be used! it may not let you have access due to it coming straight from my portal on my canvas classroom hopefully you can still pull these articles up elsewhere<\/strong><\/p>\n<p>Denning, D. E. (2015). Toward more secure software. Communications of the ACM, 58(4), 24\u201326. http:\/\/library.capella.edu\/login?url=http:\/\/dl.acm.org\/citation.cfm?id=2736281<\/p>\n<\/p>\n<p>Llerena. L., R., &#038; Acu\u00f1a, S. T. (2019). Adapting usability techniques for application in open source software: A multiple case study. Information and Software Technology, 107, 48\u201364. http:\/\/library.capella.edu\/login?url=https:\/\/dx.doi.org\/10.1016\/j.infsof.2018.10.011<\/p>\n<\/p>\n<p>Morrison, P., &#038; Williams, L. (2018). Mapping the field of software life cycle security metrics. Information and Software Technology, 102, 146\u2013159. http:\/\/library.capella.edu\/login?url=https:\/\/dx.doi.org\/10.1016\/j.infsof.2018.05.011<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class='css-6a9esh'>\n<div class='css-eql546'>\n<ul class='css-2imjyh'><\/ul>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Using the readings or additional literature, research one software security model and describe its features and applications that may be used in an organization. Evaluate the model.\u00a0In which kind of organization would it would be useful? Assess whether this model could be a good candidate for additional research. For example, where might this model be &#8230; <a title=\"Using the readings or additional literature, research one software security model and describe its features and applications that may be used in an organization. Evaluate the mo\" class=\"read-more\" href=\"https:\/\/academicwritersbay.com\/writings\/using-the-readings-or-additional-literature-research-one-software-security-model-and-describe-its-features-and-applications-that-may-be-used-in-an-organization-evaluate-the-mo\/\" aria-label=\"Read more about Using the readings or additional literature, research one software security model and describe its features and applications that may be used in an organization. Evaluate the mo\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-29556","post","type-post","status-publish","format-standard","hentry","category-essaywr"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts\/29556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/comments?post=29556"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/posts\/29556\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/media?parent=29556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/categories?post=29556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/writings\/wp-json\/wp\/v2\/tags?post=29556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}