The book provides basic building blocks of evolution in software processes, such as DevOps, scaling agile process in GSD, in order to lay a solid foundation for successful and sustainable future processes.
Table of ContentsList of Figures
List of Tables
Foreword
Preface
Acknowledgments
Acronyms
1. ReMo: A Recommendation Development Model for Software Process ImprovementSujin Choi, Dae-Kyoo Kim, Sooyong Park
1.1 Introduction
1.2 Motivation
1.3 Related Work
1.4 Recommendation Development Model: ReMo
1.4.1 Correlation Analysis
1.4.2 Refining Improvement Packages
1.4.3 Building Recommendations
1.5 Case Studies
1.5.1 Phase I
1.5.2 Phase II
1.5.3 Phase III
1.5.4 Phase IV
1.6 Evaluation
1.6.1 Process Evaluation
1.6.2 Outcome Evaluation
1.6.3 Threats to Validity
1.7 Discussion
1.8 Conclusion
References
2. A Framework for a Sustainable Software Security ProgramMonica Iovan, Daniela S. Cruzes, Espen A. Johansen
2.1 Introduction
2.2 Software Security Best Practices
2.2.1 Microsoft Security Development Lifecycle for Agile Development
2.2.2 Building Security in Maturity Model
2.2.3 OWASP Software Assurance Maturity Model
2.2.4 Software Security Services
2.3 Software Security in Visma
2.4 Top-Down and Bottom-Up Approach of a Sustainable Program
2.4.1 Ensuring the Adoption and Implementation of Security Practices
2.4.2 Enabling the Adoption and Implementation of Security Practices
2.4.3 Empowering the Teams
2.4.4 Embedding the Security Activities
2.5 Explorability of a Sustainable Software Security Program
2.5.1 Researching and Innovating Services
2.5.2 Creating New Services
2.5.3 Persuasion Focusing on the Types of Software Development Teams
2.5.4 Service Onboarding
2.6 Exploiting Existing Services
2.6.1 Collecting Continuous Feedback
2.6.2 Retrofitting the Services
2.6.3 Focus on Investment Costs and Benefits
2.6.4 Discontinuing a Service
2.7 Pitfalls of a Sustainable Software Security Program
2.8 Further Reading
2.9 Conclusion
References
3. Linking Software Processes to IT Professionalism FrameworksLuis Fernández-Sanz, Inés López Baldominos, Vera Pospelova
3.1 Introduction
3.2 Process Standards
3.3 IT Professionalism Standards
3.3.1 ESCO
3.3.2 European e-Competence Framework
3.3.3 Skills Match Framework
3.4 Linking Software Processes and IT Professionalism Frameworks
3.5 Analysis of Recommended Skills in Processes According to Participating
Professional Roles
3.6 Conclusions
References
4. Monitoring and Controlling Software Project Scope Using Agile EVMAvais Jan, Assad Abbas, Naveed Ahmad
4.1 Introduction
4.2 Related Work
4.2.1 Tools and Techniques Used for Scope Definition
4.2.2 Traditional Project Scope Definition
4.2.3 Tools and Techniques for Agile Project Scope Definition
4.3 EVM Applications and Calculation
4.4 Research Methodology
4.4.1 Systematic Literature Review
4.4.2 Mapping of Factors with A-SPSRI Elements
4.5 Quantification of A-SPSRI Elements and Running Simulation
4.5.1 Quantification of A-SPSRI Elements
4.5.2 Running Simulations and Their Integration with Agile EVM
4.5.3 Case Study 1
4.5.4 Case Study 2
4.6 Experimental Evaluation of Simulated Results
4.6.1 Regression Model Interpretation
4.6.2 Interpretation
4.7 Conclusion
References
5. Modeling Multi-Release Open Source Software Reliability Growth Process
with Generalized Modified Weibull Distribution Vishal Pradhan, Ajay Kumar, Joydip Dhar
5.1 Introduction
5.2 Background
5.3 Proposed Models
5.3.1 Model-1 (General Model)
5.3.2 Model-2 (Multi-Release Model)
5.4 Performance Evaluation with Data Analysis
5.4.1 Dataset and Parameter Estimation
5.4.2 Competing Models and Comparison Criteria
5.4.3 Least Square Estimation (LSE)
5.4.4 Goodness of Fit
5.4.5 Comparison of Results
5.5 Conclusion
References
6. Developing a Reference Model for Open Data Capability Maturity AssessmentMurat Tahir Çaldağ, Ebru Gökalp
6.1 Introduction
6.2 Literature Review
6.2.1 Theoretical Background
6.2.2 Related Works
6.3 Model Development
6.3.1 Scope
6.3.2 Design
6.3.3 Populate
6.3.4 Test
6.3.5 Deploy and Maintain
6.4 Open Data Capability Maturity Model
6.4.1 Process Dimension
6.4.2 Capability Dimension
6.5 Conclusion
References
7. AHP-Based Prioritization Framework for Software Outsourcing Human
Resource Success Factors in Global Software Development Abdul Wahid Khan, Ghulam Yaseen, Muhammad Imran Khan, Faheem Khan
7.1 Introduction
7.2 Literature Review
7.3 Research Methodology
7.3.1 Systematic Literature Review
7.3.2 Search String Process
7.3.3 Search String Development
7.3.4 Selection of Publications
7.3.5 Commencement of Data Extraction
7.3.6 Result Generated for Research Questions through SLR by Applying Final Search String
7.3.7 Categorization of Identified Success Factors
7.3.8 Analytical Hierarchical Process (AHP)
7.4 Proposed Methodology
7.4.1 Questionnaire Development
7.4.2 Data Sources
7.4.3 Validation of Identified Success Factors
7.4.4 Application of AHP to Prioritize Success Factors
7.4.5 Comparison of Proposed Framework
7.5 Limitations
7.6 Implications of the Study
7.7 Conclusions and Future Work
References
8. A Process Framework for the Classification of Security Bug ReportsShahid Hussain
8.1 Introduction
8.2 Related Work
8.2.1 Text Mining for Security Bug Report Prediction
8.2.2 Machine Learning Algorithms-Based Prediction
8.2.3 Bi-Normal Separation for Feature Selection
8.3 Proposed Methodology
8.3.1 Data Gathering and Preprocessing
8.3.2 Identifying Security-Related Keywords
8.3.3 Scoring Keywords
8.3.4 Scoring Bug Reports
8.4 Experimental Setup
8.4.1 Machine Learning Algorithm
8.4.2 Dataset
8.4.3 Performance Evaluation
8.5 Results and Discussion
8.5.1 Response to RQ1
8.5.2 Response to RQ2
8.6 Conclusion
References
9. A Systematic Literature Review of Challenges Factors for Implementing
DevOps Practices in Software Development Organizations: A Development
and Operation Teams PerspectiveMohammad Shameem
9.1 Introduction
9.2 Research Methodology
9.2.1 Stage-1: Planning the Review
9.2.2 Stage-2: Conducting the Review
9.2.3 Stage-3: Reporting the Review Process
9.3 Results
9.3.1 RQ1 (Challenges Identified in the Literature)
9.3.2 RQ2 (Most Critical Challenges)
9.3.3 RQ3 (Development and Operation Analysis)
9.4 Discussion and Summary
9.5 Threats to Validity
9.6 Conclusions and Future Study
References
10. DevOps’ Culture Challenges Model (DC2M): A Systematic Literature
Review Protocol Muhammad Shoaib Khan, Abdul Wahid Khan, Javed Khan
10.1 Introduction
10.2 Background
10.3 Systematic Literature Review Protocol
10.4 Creating the Search String
10.5 Search Strategies
10.5.1 Trial Search
10.5.2 Recognizing Search Terms Attributes
10.5.3 Results for a
10.5.4 Results for b
10.5.5 Results for c
10.5.6 Results for d
10.6 Final Search String Construction
10.7 Selection Criteria and Search Process
10.7.1 Inclusion Criteria
10.7.2 Exclusion Criteria
10.7.3 Selection of Primary Sources
10.8 Assessment of Publication Quality
10.9 Data Extraction Stage
10.9.1 Initiation of Data Extraction Phase
10.9.2 Presentation of Data Extraction
10.9.3 Data Extraction Process
10.9.4 Data Storage
10.10 Data Synthesis
10.11 Discussion
10.12 Validation of Review Protocol
10.13 Limitation
References
11 Critical Challenges of Designing Software Architecture for Internet of Things (IoT) Software SystemNoor Rehman, Abdul Wahid Khan
11.1 Introduction
11.2 Background
11.2.1 Layered Architecture Pattern
11.2.2 Microservices Software Architecture
11.2.3 Event-Driven Software Architecture Pattern
11.2.4 Blackboard Software Architecture Pattern
11.2.5 Systematic Literature Review for SADM
11.3 Research Questions
11.4 Research Methodology
11.4.1 Constructing Search Term Formulation
11.4.2 Publication Selection Process
11.4.3 Quality Assessment of the Publication
11.4.4 Data Extraction
11.4.5 Data Extraction Demonstration
11.4.6 Findings
11.5 Continent-Wise Comparison of the Challenges Found
11.6 Limitations
11.7 Conclusion and Future Work
References
12. Challenges to Project Management in Distributed Software Development:
A Systematic Literature ReviewSher Badshah
12.1 Introduction
12.2 Related Work
12.3 Methodology
12.3.1 Planning the Review
12.3.2 Conducting the Review
12.3.3 Reporting the Review
12.4 Results and Discussion
12.5 Conclusion and Future Work
References
13. Cyber Security Challenges Model: SLR-Based Protocol and Initial FindingsShah Zaib, Abdul Wahid Khan, Iqbal Qasim
13.1 Introduction
13.2 Related Work
13.3 Systematic Literature Review (SLR) Protocol
13.4 Research Questions
13.5 Search Term Construction
13.6 Strategies for Searching
13.6.1 Trial Searching
13.6.2 Characteristics of Search Terms
13.7 Process of Search String
13.7.1 Development of Search String
13.7.2 Resources to be Searched
13.8 Selection of Publication
13.8.1 Inclusion Criteria
13.8.2 Exclusion Criteria
13.8.3 Support of Secondary Reviewer
13.9 Assessment of Publication Quality
13.10 Data Extraction Phase
13.10.1 Commencement of Data Extraction Phase
13.10.2 Presentation of Extracted Data
13.10.3 Data Extraction Process
13.10.4 Data Storage
13.11 Literature Search and Selection
13.12 Results
13.12.1 Challenges in CSCM Based on Database/Digital Libraries
13.12.2 Challenges in CSCM Based on Methodology
13.13 Discussion
13.14 Limitations
13.15 Conclusion and Future Work
References
14. A Process Assessment Model for Human Resource Skill Development Enabling Digital Transformation Ebru Gökalp
14.1 Introduction
14.2 Literature Review
14.2.1 Human Resource Skill Development
14.2.2 Theoretical Background
14.3 Process Assessment Model for Human Resource Skill Development
14.3.1 Process Dimension
14.3.2 Capability Dimension
14.4 Application of the Process Assessment Model for DX-HRSD
14.5 Findings and Discussions
14.6 Conclusion
References
Back to Top