“…The full report [Evertsson&Drthberg, 2002] includes organizational considerations and introduces a communication role to link the development and security departments. Our work was mainly influenced by researchers suggesting security aspects need to be taken account of already in the process of developing IS-systems [Baskerville, 1988,92,94,2001, Siponen, 2001a-d, Siponen&Baskerville, 2001, and the facts that security needs to take account of business needs, stakeholder interests, and system contexts in a holistic approach [Magnusson, 1999, Yngstrom,1996, Fillery-James, 1999 . Our model, the Pentagon Model, can be deduced in particular from the IDEAL Approach within the SSE-CMM [SSE-CMM, 1999] and FilleryJames' Orion Strategy [Fillery-James, 1999] with some sub steps influenced by the local System Life Cycle, SLC, method.…”