Filters
total: 1145
filtered: 983
-
Catalog
Chosen catalog filters
Search results for: agile, security, software development methods
-
Towards Agile Development of Critical Software
PublicationThe paper presents a case study aiming at collecting opinions of software en-gineers on the risks related to integration of agile practices to safety-critical software development projects. The study has been performed within the scope of our research targetting at providing critical software developers with a comprehensive solution allowing to incorporate agile practices into software development process while still being conformant...
-
Agile Development of Critical Software - Can It be Justified?
PublicationThe paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering...
-
Adopting Collaborative Games into Agile Software Development
PublicationAlthough the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Utilizing online collaborative games to facilitate Agile Software Development
PublicationEffective collaboration and interaction among the development team and between the team and the customer as well as proactive attitude in initiating and implementing improvements play vital roles in the success of agile projects. The challenge is how to address these social aspects since neither the Agile Manifesto nor the Scrum Guide specify techniques that aid the human side of software development. To fill this gap, we developed...
-
Introducing agile practices into development processes of safety critical software
PublicationIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
A Qualitative Study on Non-functional Requirements in Agile Software Development
PublicationWidespread use of agile software development (ASD) methods can be observed nowadays. Non-functional requirements (NFRs) are often reported to be a problematic issue for agile projects, since ASD methods tend to neglect NFRs while focusing on incremental delivery of functional features. Despite that, only very few studies have explored the requirements engineering practices used in ASD and dedicated particularly to NFRs. Objective:...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublicationThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Scientific Collaboration, Citation and Topic Analysis of International Conference on Agile Software Development Papers
PublicationThe International Conference on Agile Software Development (XP) was established almost sixteen years ago. Based on data from Scopus database, a total of 789 papers have been published in between years of 2002 and 2018. We employed bibliometrics analysis and topic modeling with R/RStudio to analyze these published papers from various dimensions, including the most active authors, collaboration of authorship, most cited papers, used...
-
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
PublicationThis study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...
-
A Systematic Literature Review on Implementing Non-functional Requirements in Agile Software Development: Issues and Facilitating Practices
PublicationAgile Software Development methods have become a widespread approach used by the software industry. Non-functional requirements (NFRs) are often reported to be a problematic issue for such methods. We aimed to identify (within the context of Agile projects): (1) the issues (challenges and problems) reported as affecting the implementation of NFRs; and (2) practices that facilitate the successful implementation of NFRs. We conducted...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublicationIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
Resilience and Security in Software Defined Networking
PublicationThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Communication and Documentation Practices in Agile Requirements Engineering: A Survey in Polish Software Industry
PublicationRequirements engineering, system analysis and other analytical activities form the basis of every IT project. Such activities are not clearly defined in Agile development methods, but it does not mean that they are absent in an agile project. The aim of our work was to determine which practices related to requirements-related communication and which requirements documenting techniques are used in agile software projects. For this...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Scaled agile framework. Dealing with software process‐related challenges of a financial group with the action research approach
PublicationThis article reports on a domain-specific software development venture at Nordea. We explore organizational constraints, challenges, and corrective actions undertaken when scaling the agile development approach of their Core Banking Platform program. The fit and required customizations of the rather complex and rigid SAFe framework in a policy-heavy financial institution are audited against the organic growth of the program. In...
-
Pączkowanie - metoda rozwoju interoperacyjnych komponentów dla systemów rozproszonych = Budding – the software development method of interoperable components for distributed systems
PublicationPrzedstawiono 2 współczesne metody wytwarzania oprogramowania: iteracyjno-przyrostową oraz techniki zwinne, ich zalety i wady w kontekście budowy interoperacyjnych platform i środowisk rozproszonych. Zaprezentowano metodę rozwoju oprogramowania przez pączkowanie, jej założenia, zalety i wady. Przedstawiono technologie, na bazie których działa metodologia wytwarzania oprogramowania przez pączkowanie: Software Product Line, Enterprise...
-
Współczesne metody zapewniania jakości oprogramowania. Od klasyki do zwinności
PublicationKsiążka opisuje problematykę jakości w kontekście metod wytwarzania oprogramowania. Składa się z 22 rozdziałów podzielonych na 6 części: Znaczenie jakości oprogramowania, Podstawowe pojęcia i problemy jakości, Jakość w ujęciu klasycznym, Pomiary jakości, Dokumentacja i normy jakości procesu, Jakość w podejściu zwinnym. Zebrany materiał pokazuje ewolucję podejścia do jakości w klasycznych metodykach wytwarzania (od modelu kaskadowego...
-
Modern Methods of Software Development
PublicationSoftware development methods consist of such activities like analysis, planning, development, testing, deployment, maintenance and retirement. All of them can be divided into two main categories - traditional and agile. The objective of this paper is to review some of the most popular traditional, agile and open source development methods. Special attention was paid to the common stages of all methods - testing and maintenance.
-
Agile Methods In Formation of Metropolis Neighbourhood
PublicationA study of the zone adjoining the metropolis area of Tricity (Poland) was conducted on the basis of analyses of changes in spatial development, outline planning decisions and local plans of spatial development. Localities placed at several dozen kilometres from strongly urbanized areas do not constitute metropolis outskirts. The vicinity of large urban centres is an obstacle to the development of localities as self-sufficient units...
-
Applying agiile practices to the development of safety-critical software
PublicationDevelopment of safety critical software is subjected to numerous restrictions and recommendations. To meet these requirements classical software development models (e.g. V-model) are usually applied. Agile methodologies, although rapidly increasing their popularity, were generally regarded as unsuitable for such projects. However, they offer potential benefits which provide a strong incentive to incorporate them into safety-critical...
-
MaliciousIDE – software development environment that evokes emotions
PublicationEmotions affect every aspect of human live, including work. Numerous studies in software engineering have shown that negative emotions can lower the productivity of programmers. Unlike traditional approaches to managing software development, modern methods, such as Agile and Lean, take into account human aspects of programming. To thoroughly investigate the impact of negative emotions on the work of programmers, a malicious integrated...
-
Software development methodologies and practices in start-ups
PublicationSoftware start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...
-
Method of selecting programming practices for the safety-critical software development projects
PublicationIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
A Case Study on Implementing Agile Techniques and Practices: Rationale, Benefits, Barriers and Business Implications for Hardware Development
PublicationAgile methodologies, along with the corresponding tools and practices, are claimed to facilitate teams in managing their work more effectively and conducting their work more efficiently while fostering the highest quality product within the constraints of the budget. Therefore, the rate of awareness and adoption of Agile frameworks both within and outside the software industry has increased significantly. Yet, the latest studies...
-
Artificial intelligence for software development — the present and the challenges for the future
PublicationSince the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...
-
Towards the participant observation of emotions in software development teams
PublicationEmotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...
-
An approach to improving agility and discipline of software development with Scrum and CMMI
PublicationThe paper reports on two case studies of combining the Scrum methodology with the CMMI maturity model to improve together agility and discipline of software development. First, we propose the CMMI-Scrum reference model, which maps Scrum practices onto 123 practices of CMMI Staged level 2 and 3. Then, for 60% of CMMI practices, which are insufficiently covered by Scrum we extend Scrum with new practices that improve discipline while...
-
Improving agility and discipline of software development with the Scrum and CMMI
PublicationThis study presents a method of combining the Scrum methodology with the CMMI maturity model to improve bothagility and discipline of software development. First, the authors propose the CMMI-Scrum reference model, which maps Scrumpractices onto 123 practices of CMMI staged levels 2 and 3. For 60% of CMMI practices, which are insufficiently covered byScrum they add new practices that improve discipline while maintaining agility....
-
Exploring the Prevalence of Anti-patterns in the Application of Scrum in Software Development Organizations
PublicationThe paper presents a survey-based study that aimed to determine the prevalence of anti-patterns in the Scrum software development methodology. A total of 35 anti-patterns were selected from the literature review, and 42 respondents indicated whether they had encountered each anti-pattern in their organizations. The study found that``Unfinished Tasks'' was the most prevalent anti-pattern, highlighting the importance of proper planning...
-
A new open-source software developed for numerical simulations usingdiscrete modeling methods
PublicationThe purpose of this work is to present the development of an open-source software based on a discrete description of matter applied to study the behavior of geomaterials. This software uses Object Oriented Programming techniques, and its methodology design uses three different methods, which are the Discrete Element Method (DEM) [F. Donzé, S.A. Magnier, Formulation of a three-dimensional numerical model of brittle behavior, Geophys....
-
Emotions in the software development process
PublicationThis paper presents the results of a survey on the experience of emotions in the work of software developers. Quantitative analysis revealed information about emotions affecting programmers, their frequency and impact on their performance. The concept of emotional risk to productivity was also presented. It allows to choose the emotional states, which should be avoided. Furthermore, all collected data were analyzed with information...
-
The Development of a Conceptual Framework for Knowledge Sharing in Agile IT Projects
PublicationOrganizations must adapt their resources to meet the challenges associated with changes in the work environment in order to remain competitive in the information era. Several research findings identify knowledge sharing as a means for an organization to improve its competitiveness. Knowledge sharing can be defined in a variety of ways, but it essentially refers to the exchange of knowledge from an information giver to an information...
-
Hip endhoprothesis development using rapid prototyping methods
PublicationIntegrated product development based on Rapid Prototyping methods, connected with computer aided 3D design and computer aided engineering enables fast and full new product verification and validation. A case study derived from clinical and technological practice using hip implant construction is also included.
-
Software for development and communication with FPGA based hardware
Publication -
Institutionalization of knowledge sharing in a software development organization
PublicationZaproponowano podejście modelowe do problemu wymiany wiedzy. Omówiono implementację modelu na przykładzie instytucji zajmującej się produkcja oprogramowania komputerowego.
-
Elastic wave propagation software - visualization methods
PublicationW pracy omówiono program do analizy propagacji fal spręzystych w 2 wymiarowych elementach konstrukcyjnych bazujący na metodzie spektralnych elementów skończonych.
-
Machine Learning Assisted Interactive Multi-objectives Optimization Framework: A Proposed Formulation and Method for Overtime Planning in Software Development Projects
PublicationMachine Learning Assisted Interactive Multi-objectives Optimization Framework: A Proposed Formulation and Method for Overtime Planning in Software Development Projects Hammed A. Mojeed & Rafal Szlapczynski Conference paper First Online: 14 September 2023 161 Accesses Part of the Lecture Notes in Computer Science book series (LNAI,volume 14125) Abstract Software development project requires proper planning to mitigate risk and...
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publication -
Integrating quality criteria and methods of evaluation for software models
PublicationRozdział podejmuje zagadnienia jakości modeli w inżynierii oprogramowania. Zawiera on przegląd i systematyzację kryteriów jakości modeli oraz metod oceny jakości modeli. Podaje metodologię tworzenia metod oceny jakości modeli w zależności od kryteriów jakości oraz innych parametrów oceny. Zawiera również studia przypadków zastosowania tej metodologii.
-
Data Model Development for Security Information Sharing in Smart Grids
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
A comparative analysis of methods and tools for low impact development (LID) site selection
PublicationThe site selection for Low Impact Development (LID) practices is a significant process. It affects the effectiveness of LID in controlling stormwater surface runoff, volume, flow rate, and infiltration. This research paper presents a comprehensive review of various methods used for LID site selection. It starts by introducing different methods and tools. Three main methods: index-based methods, GIS-based multi-criteria decision...
-
Safety of computer control systems: challenges and results in software development.
PublicationArtykuł dokonuje przeglądu wybranych wyników dotyczących poprawy bezpieczeństwa komputerowych systemów sterowania. Dyskusja pokrywa szeroki zakres aspektów dotyczących procesu wytwarzania takich systemów. W szczególności omówiono zagadnienia dotyczące różnorodności oprogramowania, oprogramowania off-the-shelf, analizy typów awarii i ich efektów oraz formalizacji procesu wytwórczego.
-
Perceptions of Gender Diversity's Impact on Mood in Software Development Teams
PublicationGender inequality persists in IT teams. We examine how gender differentiation affects the workplace atmosphere and analyze the results of our study of the issue. We discuss the problem of gender discrimination and consider methods to reduce inequality
-
SMOTE-Based Homogeneous Ensemble Methods for Software Defect Prediction
Publication -
Methods for Elucidation of DNA-Anticancer Drug Interactions and Their Applications in the Development of New Drugs
PublicationDNA damaging agents including anthracyclines, camptothecins and platinum drugs are among most frequently used drugs in the chemotherapeutic routine. Due to their relatively low selectivity for cancer cells, administration is associated with adverse side effects, whereas the inherent genotoxicity of these drugs is associated with risk of developing secondary cancers. Development of new drugs, which could be spared of these drawbacks...
-
Methods of building knowledge-based systems applied in software project management
PublicationPraca zawiera rozdział poświecony problematyce budowy systemów z bazami wiedzy dla wspomagania procesów zarządzania. W rozdziale tym przedstawiono metody budowy systemów dla potrzeb zarządzania koncentrując uwagę na systemach opartych na wiedzy. Następnie omówiono możliwości zastosowania teorii zbiorów rozmytych do modelowania wiedzy. Na zakończenie przedstawiono przykład wykorzystania zbiorów rozmytych i systemów opartych na wiedzy...
-
development of an open source software to transform acoustic data for classification of benthic habitat
Publication.
-
Experience with instantiating an automated testing process in the context of incremental and evolutionary software development
PublicationThe purpose of this article is to present experiences from testing a complex AJAX-based Internet-system which is under development for more than five years. The development process follows incremental and evolutionary lifecycle model and the system is delivered in subsequent releases. Delivering a new release involves both, the new tests (related to the new and/or modified functionalities) and the regression tests (after their...
-
Recent development in rigorous computational methods in dynamical systems
Publication -
Impeller pump development using rapid prototyping methods
PublicationMetody szybkiego prototypowania przy wspomaganiu komputerowym projektowania 3D wraz z systemami wspomagania inżynierskiego pozwalają uzyskać wyrób o prognozowanych właściwościach technologicznych i użytkowych.W artykule przedstawiono studium przypadku zastosowania metod szybkiego prototypowania w rozwoju elementów pomp wirowych.
-
Impact of Feature Selection Methods on the Predictive Performance of Software Defect Prediction Models: An Extensive Empirical Study
Publication -
Review of intelligent software architectures for the development of an intelligent decision support system for design process planning in concurrent engineering
PublicationW artykule poddano dogłębnej analizie szereg inteligentnych technik miękkie-go modelowania pod katem ich przydatności w obszarze wspomagania procesówplanowania dla inżynierii współzadaniowej. Skoncentrowano się na wspomaganiujednego z najważniejszych obszarów inżynierii współzadaniowej, a mianowicieprocesu projektowania. W wyniku analizy zaproponowano architekturę wspomaga-nia opartą na tablicowej bazie wiedzy modelującej wnioskowanie...
-
Using Statistical Methods to Estimate The Worst Case Response Time of Network Software Running on Indeterministic Hardware Platforms
PublicationIn this paper we investigate whether the statistical Worst Case Execution Time (WCET) estimation methods devised for embedded platforms can be successfully applied to find the Worst Case Response Time (WCRT) of a network application running on a complex hardware platform such as a contemporary commercial off-the-shelf (COTS) system. Establishing easy-to-use timing validation techniques is crucial for real-time applications and...
-
Development of sensitive cathepsin G fluorogenic substrate using combinatorial chemistry methods
Publication -
Development and Assessment of Regeneration Methods for Peptide-Based QCM Biosensors in VOCs Analysis Applications
PublicationCleaning a quartz crystal microbalance (QCM) plays a crucial role in the regeneration of its biosensors for reuse. Imprecise removal of a receptor layer from a transducer’s surface can lead to unsteady operation during measurements. This article compares three approaches to regeneration of the piezoelectric transducers using the electrochemical, oxygen plasma and Piranha solution methods. Optimization of the cleaning method allowed...
-
Machine Learning Methods in Damage Prediction of Masonry Development Exposed to the Industrial Environment of Mines
Publication -
The computational methods in the development of a novel multianalyte calibration technique for potentiometric integrated sensors systems
PublicationIn recent years, integration and miniaturization of ion-selective electrodes (ISEs) have brought many benefits resulting in the possibility of simultaneous determination of the ions concentration in small volume samples. One of the key problems related to the preparation of potentiometric integrated sensors systems (PISSs) is a calibration procedure due to the necessity to calibrate each particular sensor separately. The main aim...
-
Development of methods improving storage stability of bitumen modified with ground tire rubber: A review
PublicationThe following paper presents an overview of methods for improving the storage stability at high temperature of rubber modified bitumen. The storage stability of the rubber modified bitumen can be improved by using a various types of modifiers that form the bonds between the components of these binders. The increase in stability can also be achieved by using crumbrubber surface-activated by furaldehyde or ground tire rubber (GTR)...
-
Targeted metabolomics in bladder cancer: From analytical methods development and validation towards application to clinical samples
Publication -
Suitability of DIC and ESPI optical methods for monitoring fatigue damage development in X10CrMoVNb9-1 power engineering steel
Publication -
Chemical surface etching methods for ground tire rubber as sustainable approach for environmentally-friendly composites development– a review
PublicationGround tire rubber (GTR) has been used as a sustainable low-cost modifier in various composites. However, due to the hydrophobic nature of GTR, it is in compatible with most matrices and results in deterioration in both mechanical and physical properties of composites. This necessitates pre-modification of the powdered rubber to improve the interfacial bonding at the rubber-matric interface. The most common GTR modification research...
-
Development of different methods for drugs and psychoactive substances extraction from hair samples and their identification based on HPLC-ESI-QTOF analysis
PublicationOver the past decade, the use of non-controlled designer drugs and drug of abuse has rapidly increased. Hair, as a human matrix, enables detection of drugs incorporated into its structure. Studies of presence and identification of drug metabolites in human hair samples has been performed using liquid chromatography electrospray ionization quadrupole time of flight mass spectrometry (HPLC-ESI-QTOF-MS) with steady alternation of...
-
Trends in Automotive Emission Legislation: Impact on LD Engine Development, Fuels, Lubricants and Test Methods: a Global View, with a Focus on WLTP and RDE Regulations
Publication -
Agile Requirements Prioritization in Practice: Results of an Industrial Survey
PublicationAgile software development stresses the importance of providing the customer with a product of a maximized business value. To achieve that, requirements prioritization is used. Agile development methods like Scrum define guidelines for prioritization, however practitioners do not necessarily have to follow them. Our goal was to investigate the industry practice related to requirements prioritization process, including its timing,...
-
Identification of the Agile Mindset and Its Comparison to the Competencies of Selected Agile Roles
PublicationIn this paper we present the results of the identification and evalua-tion of the elements of an agile mindset as well as its comparison to the compe-tence models for the roles of Scrum Master, Product Owner and agile analyst. We have identified 70 unique agile mindset elements from literature and 5 in-terviews with experts. Based on an opinion survey among 52 agile practitioners we evaluated the importance of 26 selected elements...
-
Balancing agility and discipline in a research project
PublicationSuccessful software development requires both agility and discipline. Optimal selection of methods, however, is not an easy task. The problem becomes even more difficult for long lasting projects. Appropriate selection of methods involving skillful introduction and abandonment of certain practices in time makes the whole process dynamic. The paper presents in this context a research project which was realized in a few iterations....
-
Playing the Sprint Retrospective
PublicationIn agile software development, where great emphasis is put on effective informal communication, success depends heavily on human and social factors. However, Scrum does not specify any techniques that aid the human side of software development. In this paper we investigate the use of 6 collaborative games for the Sprint Retrospective. Each game was implemented twice in a Scrum team in Intel Technology Poland. The received feedback...
-
Interaction Design in Agile IT Projects
PublicationIn recent years, interactive systems, such as various types of software, online services or mobile applications, have become an integral part of everyday life. Interactive systems and digital services should be easy to use and provide a positive User Experience (UX). For this reason, interaction design has recently emerged as a distinct professional area of information technology (IT). Easy interaction and user experience (UX)...
-
Adopting Collaborative Games into Agile Requirements Engineering
PublicationIn agile software development, where great emphasis is put on effective informal communication involving diverse stakeholders, success depends on human and social factors. Not surprisingly, the Agile Manifesto advocates principles and values such as “individuals and interactions over processes and tools”, “focus on the customer”, “collaborate regularly”, “communicate face-to-face within the team” and “have regular team introspection”....
-
Antecedents to Achieve Kanban Optimum Benefits in Software Companies
PublicationIn 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...
-
Building Dedicated Project Management Process Basing on Historical Experience
PublicationProject Management Process used to manage IT project could be a key aspect of project success. Existing knowledge does not provide a method, which enables IT Organizations to choose Project Management methodology and processes, which would be adjusted to their unique needs. As a result, IT Organization use processes which are not tailored to their specific and do not meet their basic needs. This paper is an attempt to fill this...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Game-based Sprint retrospectives: multiple action research
PublicationIn today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Ontology Engineering Aspects in the Intelligent Systems Development
PublicationThe ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.
-
Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices
PublicationThis paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...
-
Jakość oprogramowania w zwinnym podejściu do zarządzania projektami informatycznymi
PublicationCel: Celem artykułu jest ocena, czy wykorzystanie podejścia zwinnego Scrum w organizacji podnosi jakość wytwarzanego oprogramowania oraz próba uzyskania odpowiedzi na pytanie, jak nowelizacja Przewodnika po Scrumie (Scrum Guide) z listopada 2020 roku wpłynęła na proces wytwarzania oprogramowania. Projekt badania/metodyka badawcza/koncepcja: Przyjętą metodyką badawczą jest przegląd literatury przedmiotu oraz badania własne autora....
-
Evaluation of Readiness of IT Organizations to Agile Transformation Based on Case-Based Reasoning
PublicationNowadays many of IT organization decides to change the way of delivering from classic, waterfall approach to agile. This transition is called “agile transformation” (AT). The problem of this process is that part of companies started AT without any analysis. This causes that many of transitions fails and organizations must return to old methods of delivering. Cost of return is significant and number of projects with violated project...
-
Completeness and Consistency of the System Requirement Specification
PublicationAlthough the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...
-
Adopting collaborative games into Open Kanban
PublicationThe crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...
-
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Anti-theft lab security system based on RFID
PublicationThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Overview of new product development strategies and models
PublicationMotivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies and models...
-
Agile Commerce in the light of Text Mining
PublicationThe survey conducted for this study reveals that more than 84% of respondents have never encountered the term “agile commerce” and do not understand its meaning. At the same time, they are active participants of this strategy. Using digital channels as customers more often than ever before, they have already been included in the agile philosophy. Based on the above, the purpose of the study is to analyse major text sets containing...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Overview of new product development strategies and models
PublicationMotivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems
PublicationRequirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Ontology-Aided Software Engineering
PublicationThis thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Analysis of human behavioral patterns
PublicationWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...