{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T00:08:01Z","timestamp":1721261281691},"reference-count":24,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T00:00:00Z","timestamp":1556841600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"name":"NASA Independent Verification and Validation Facility","award":["NNX16AD54G"]}],"content-domain":{"domain":["incose.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Systems Engineering"],"published-print":{"date-parts":[[2019,7]]},"abstract":"Abstract<\/jats:title>Agile methods have gained wide acceptance over the past several years. They are now a standard management and execution approach for small\u2010scale system development projects. While Agile methods are not generally applicable to large multiyear and mission\u2010critical systems, hybrid Agile approaches are being developed to exploit the productivity improvements of Agile while retaining the necessary process rigor and coordination needs of these types of projects. From the perspective of Independent Verification and Validation (IV&V), however, adoption of these hybrid\u2010Agile frameworks is becoming problematic. Hence, we find it prudent to question the compatibility of conventional IV&V techniques with hybrid\u2010Agile practices.<\/jats:p>This paper documents investigation of relevant literature, the modification and adoption of Agile frameworks to accommodate the development of large scale, mission\u2010critical systems, and the compatibility of standard IV&V techniques within hybrid\u2010Agile development frameworks. Specific to the latter, we find that the IV&V techniques employed within a hybrid\u2010Agile process can be divided into three groups: early lifecycle techniques that are fully compatible with the hybrid frameworks, techniques that focus on tracing requirements, test objectives, etc, which are somewhat problematic, but can be tailored with modest effort, and techniques involving an assessment requiring artifact completeness, and consequently, are not compatible with hybrid\u2010Agile processes. We identify seven prominent techniques in this third category and propose alternative approaches that achieve similar goals and which can be applied within an Agile development process.<\/jats:p>","DOI":"10.1002\/sys.21487","type":"journal-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T09:53:36Z","timestamp":1556877216000},"page":"348-360","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Applying standard independent verification and validation techniques within an agile framework: Identifying and reconciling incompatibilities"],"prefix":"10.1002","volume":"22","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3371-1621","authenticated-orcid":false,"given":"James B.","family":"Dabney","sequence":"first","affiliation":[{"name":"Systems Engineering Program University of Houston \u2010 Clear Lake Houston Texas"}]},{"given":"James D.","family":"Arthur","sequence":"additional","affiliation":[{"name":"Department of Computer Science Virginia Tech Blacksburg Virginia"}]}],"member":"311","published-online":{"date-parts":[[2019,5,3]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.033"},{"key":"e_1_2_8_3_1","unstructured":"DouglasB.Top 5 tips for using Agile in mission critical systems development. IBM Developer Works 2012."},{"key":"e_1_2_8_4_1","doi-asserted-by":"crossref","unstructured":"BowersJ MayJ MelanderE BaarmanM AyoobA.Tailoring XP for large system mission critical software development. Motorola 2002.","DOI":"10.1007\/3-540-45672-4_10"},{"key":"e_1_2_8_5_1","unstructured":"GuQ LeeSJ SmithS.Documentation development for mission\u2010critical Department of Defense systems using Scrum Agile software development methodologies. George Mason University Systems Engineering and Operations Research Department 2013."},{"issue":"2","key":"e_1_2_8_6_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/sys.20141","article-title":"Agile architecture framework for model driven development of C2 systems","volume":"13","author":"Hallberg N","year":"2009","journal-title":"Syst Eng"},{"key":"e_1_2_8_7_1","first-page":"151","article-title":"Adopting Agile in an FDA regulated environment","author":"Rasmussen Ro","year":"2009","journal-title":"AGILE"},{"key":"e_1_2_8_8_1","unstructured":"LeffingwellD.Agile software development with verification and validation in high assurance and regulated environments. Leffingwell LLC and Rally Software Development Corporation 2014."},{"key":"e_1_2_8_9_1","unstructured":"IV&V for Agile projects. Enterprise knowledge http:\/\/enterprise-knowledge.com 2014 accessed 13 April 2019."},{"key":"e_1_2_8_10_1","unstructured":"DabneyJB BarberG OhiD.Estimating direct return on investment of independent verification and validation. The 8th International Conference on Software Engineering and Applications Cambridge MA November 9\u201011 2004."},{"key":"e_1_2_8_11_1","doi-asserted-by":"crossref","unstructured":"HaskinsW SteckleinJ LovellR et\u00a0al.Error cost escalation through the project life cycle. 14th International Symposium of the International Council on Systems Engineering Toulouse France Jun 2004.","DOI":"10.1002\/j.2334-5837.2004.tb00608.x"},{"key":"e_1_2_8_12_1","volume-title":"Wiley Series in New Dimensions in Engineering","author":"Lewis R","year":"1992"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1984.233702"},{"key":"e_1_2_8_14_1","volume-title":"Agile Software Development Ecosystems","author":"Highsmith J","year":"2002"},{"key":"e_1_2_8_15_1","unstructured":"BeckK MartinRC CockburnA FowlerM HighsmithJ.Manifesto for Agile Software Development.www.agilemanifesto.org Utah Feb2001 accessed 13 April 2019."},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"McGinnK NelsonM DaigleD.Integrating information assurance into Agile and rapid technology development. Cross Talk: The Journal of Defense Software Engineering November\/December;2013.","DOI":"10.21236\/ADA596047"},{"key":"e_1_2_8_17_1","unstructured":"LeffingwellD MeissnerM LangenfeldC.Agile software development with verification and validation in high assurance and regulated environments. Leffingwell LLC and Rally Software Development Corporation;2011."},{"key":"e_1_2_8_18_1","volume-title":"Rapid Application Development","author":"Martin J","year":"1991"},{"key":"e_1_2_8_19_1","unstructured":"SanhotraM.Water\u2010scrum\u2010fall: the first step toward Agility.https:\/\/www.scrumalliance.org\/community\/articles\/2015\/june\/water-scrum-fall June2015 accessed 13 April 2019."},{"key":"e_1_2_8_20_1","unstructured":"Scaled Agile https:\/\/www.scaledagileframework.com\/ 2018 accessed 13 April 2019."},{"key":"e_1_2_8_21_1","unstructured":"Department of Education Federal Student Aid.Independent Verification and Validation (IV&V) Handbook. Version 4.4 2013."},{"key":"e_1_2_8_22_1","unstructured":"HuberM.Reasoning with uncertainty: Dempster\u2010Shafer.2005."},{"key":"e_1_2_8_23_1","unstructured":"Altassian https:\/\/www.atlassian.com\/software\/jira 2018 accessed 13 April 2019."},{"key":"e_1_2_8_24_1","unstructured":"Altassian https:\/\/www.atlassian.com\/software\/confluence 2018 accessed 13 April 2019."},{"key":"e_1_2_8_25_1","unstructured":"IBM https:\/\/www.ibm.com\/us-en\/marketplace\/rational-rhapsody 2017 accessed 13 April 2019."}],"container-title":["Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsys.21487","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sys.21487","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/sys.21487","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sys.21487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T16:03:31Z","timestamp":1721232211000},"score":1,"resource":{"primary":{"URL":"https:\/\/incose.onlinelibrary.wiley.com\/doi\/10.1002\/sys.21487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,3]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1002\/sys.21487"],"URL":"https:\/\/doi.org\/10.1002\/sys.21487","archive":["Portico"],"relation":{},"ISSN":["1098-1241","1520-6858"],"issn-type":[{"value":"1098-1241","type":"print"},{"value":"1520-6858","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,3]]},"assertion":[{"value":"2018-11-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}