Search results for: agile, security, software development methods - Bridge of Knowledge

Search

Search results for: agile, security, software development methods

Search results for: agile, security, software development methods

  • Kamil Andrzej Rybacki mgr inż.

    Born on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...

  • Building Dedicated Project Management Process Basing on Historical Experience

    Publication

    - Year 2017

    Project Management Process used to manage IT project could be a key aspect of project success. Existing knowledge does not provide a method, which enables IT Organizations to choose Project Management methodology and processes, which would be adjusted to their unique needs. As a result, IT Organization use processes which are not tailored to their specific and do not meet their basic needs. This paper is an attempt to fill this...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Tomasz Janowski dr

    Tomasz Janowski is the Head of the Department of Informatics in Management, Faculty of Management and Economics, Gdańsk University of Technology, Poland; Invited Professor at the Department for E-Governance and Administration, Faculty of Business and Globalization, University for Continuing Education Krems, Austria; and Co-Editor-in-Chief of Government Information Quarterly, Elsevier. Previously, he was the first and founding Head...

  • Grzegorz Zieliński dr inż.

    Author of over 100 scientific publications (both in Polish and English) in the field of service management, entity improvement, including medical entities. Scientific and research interests include areas related to the maturity and excellence of enterprises in various aspects of their activities. He participated in research projects of the National Science Center and projects implemented by international consortia under the European...

  • Game-based Sprint retrospectives: multiple action research

    In today’s fast-paced world of rapid technological change, software development teams need to constantly revise their work practices. Not surprisingly, regular reflection on how to become more effective is perceived as one of the most important principles of Agile Software Development. Nevertheless, running an effective and enjoyable retrospective meeting is still a challenge in real environments. As reported by several studies,...

    Full text available to download

  • Piotr Szczuko dr hab. inż.

    Piotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...

  • Towards Cognitive and Perceptive Video Systems

    Publication
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Year 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Full text to download in external service

  • Gabriela Rembarz dr inż. arch.

    Gabriela Rembarz inżynier-architekt, urbanista, naukowiec, dydaktyk i aktywna projektantka, jest doktorem nauk technicznych w dyscyplinie architektura i urbanistyka, Ukończyła studia magisterskie na Wydziale Architektury i Urbanistyki Politechniki Gdańskiej, uzupełniając je specjalizacją w Ochronie Środowiska w ramach międzyuczelnianego CENVIG Center of Environmental Studies (Politechnika Gdańska) akredytowanego przez Roskilde...

  • Ontology Engineering Aspects in the Intelligent Systems Development

    The ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.

  • Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices

    Publication

    This paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...

  • Jakość oprogramowania w zwinnym podejściu do zarządzania projektami informatycznymi

    Publication

    Cel: Celem artykułu jest ocena, czy wykorzystanie podejścia zwinnego Scrum w organizacji podnosi jakość wytwarzanego oprogramowania oraz próba uzyskania odpowiedzi na pytanie, jak nowelizacja Przewodnika po Scrumie (Scrum Guide) z listopada 2020 roku wpłynęła na proces wytwarzania oprogramowania. Projekt badania/metodyka badawcza/koncepcja: Przyjętą metodyką badawczą jest przegląd literatury przedmiotu oraz badania własne autora....

    Full text to download in external service

  • Agnieszka Landowska dr hab. inż.

    Agnieszka Landowska works for Gdansk University of Technology, FETI, Department of Software Engineering.  Her research concentrates on usability, accessibility and technology adoption, as well as affective computing methods. She initiated Emotions in HCI Research Group and conducts resarch on User eXperiene evaluation of applications and other technologies.

  • Evaluation of Readiness of IT Organizations to Agile Transformation Based on Case-Based Reasoning

    Publication

    - Year 2017

    Nowadays many of IT organization decides to change the way of delivering from classic, waterfall approach to agile. This transition is called “agile transformation” (AT). The problem of this process is that part of companies started AT without any analysis. This causes that many of transitions fails and organizations must return to old methods of delivering. Cost of return is significant and number of projects with violated project...

    Full text available to download

  • Completeness and Consistency of the System Requirement Specification

    Although the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...

    Full text available to download

  • Adopting collaborative games into Open Kanban

    Publication

    - Year 2016

    The crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...

    Full text to download in external service

  • SDN testbed for validation of cross-layer data-centric security policies

    Publication

    - Year 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Full text to download in external service

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Full text available to download

  • Critical systems software testing and QA - Spring'24

    e-Learning Courses
    • A. Kaczmarek
    • B. Wiszniewski

    Course objectives: Present software development standards in the European space industry and techniques of their implementation. Learn how to assess and manage critical system software quality in an IT project. Gain basic hands-on experience in bug tracking and reporting in a software project.

  • Overview of new product development strategies and models

    Publication

    - Catallaxy - Year 2023

    Motivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies and models...

    Full text available to download

  • International Conference on Model-Driven Engineering and Software Development

    Conferences

  • Agile Commerce in the light of Text Mining

    The survey conducted for this study reveals that more than 84% of respondents have never encountered the term “agile commerce” and do not understand its meaning. At the same time, they are active participants of this strategy. Using digital channels as customers more often than ever before, they have already been included in the agile philosophy. Based on the above, the purpose of the study is to analyse major text sets containing...

    Full text available to download

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Mobile Security: Threats and Best Practices

    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022

    e-Learning Courses
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023

    e-Learning Courses
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024

    e-Learning Courses
    • A. Wardziński
    • R. Leszczyna

    The aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.

  • Overview of new product development strategies and models

    Publication

    - Catallaxy - Year 2023

    Motivation: The motivation for the overview presented in this article is to provide a starting point for considering whether existing new product development methodology and its level of detail allows product teams to develop high-quality and business-effective product concepts. Aim: The aim of this article is recognise the current state of research into new product development methodology and to present the strategies...

    Full text to download in external service

  • Barbara Kusznierewicz dr hab. inż.

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • International Conference on Software Engineering and Formal Methods

    Conferences

  • What Is Troubling IT Analysts? A Survey Report from Poland on Requirements-Related Problems

    Requirements engineering and business analysis are activities considered to be important to software project success but also difficult and challenging. This paper reports on a survey conducted in Polish IT industry, aimed at identifying most widespread problems/challenges related to requirements. The survey was targeted at people performing role of analyst in commercial IT projects. The questionnaire included 64 pre-defined problems...

    Full text available to download

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publication

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Full text to download in external service

  • Ontology-Aided Software Engineering

    Publication

    - Year 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Full text to download in external service

  • SkinDepth - synthetic 3D skin lesion database

    Open Research Data
    version 1.0 embargo

    SkinDepth is the first synthetic 3D skin lesion database. The release of SkinDepth dataset intends to contribute to the development of algorithms for:

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Full text available to download

  • Analysis of human behavioral patterns

    Publication

    - Year 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Full text to download in external service

  • Spatial Modelling in Environmental Analysis and Civil Engineering

    As can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...

    Full text available to download

  • Approaching Secure Industrial Control Systems

    Publication

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Full text available to download

  • Developing competences of IT project managers using simulation games

    Publication

    Project Management is a domain in which methodological approach is developing very rapidly. Project managers are required to present knowledge of the various methods of project management and apply them to the management of specific projects. It means that project managers must constantly develop their competence, mainly based on good practices from different formal methods of project management. The purpose of this article is...

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publication

    - Year 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text to download in external service

  • Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties

    Publication

    - Journal of Software and Systems Development - Year 2021

    Full text to download in external service

  • Overcoming Challenges of Virtual Scrum Teams: Lessons Learned Through an Action Research Study

    Publication

    - Year 2023

    After the COVID-19 breakout, agile teams found themselves in situations that “pure agilists” and textbooks on agile methods had preferred to ignore. Whereas agile mindsets helped them to quickly shift to remote work, mere virtualization of agile practices often proved insufficient, and several challenges emerged. This paper reports on an Action Research project carried out in Lufthansa Systems Poland with the aim of (1) revisiting...

    Full text to download in external service

  • Formal Methods in Software Engineering and Defence Systems Workshop

    Conferences

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Acceptance Testing of Software Products for Cloud-Based On-Line Delivery

    Publication

    Software products intended for on-line delivery by distributors serving an open community of subscribers are developed in a specific life-cycle model, in which roles of the major stakeholders are strongly separated, unlike in any other software development model known in software engineering. Its specificity underlines the fact that a distributor of the final product, responsible for its acceptance for publication and delivery...

    Full text available to download

  • Understanding Sustainable Knowledge-Sharing in Agile Projects: Utilizing Follow-the-Sun Technique (FTS) in Virtual Teams

    Publication

    - Year 2023

    In Agile IT projects, promoting effective knowledge sharing is essential not only for achieving success but also for supporting Sustainable Development Goals (SDGs). However, Companies using virtual teams may face challenges in coordinating work, particularly when teams are distributed across different time zones, ultimately hindering their ability to consistently share knowledge. This can lead to delays and inefficiencies, ultimately...

    Full text available to download

  • The level of Knowledge and use of tax exemptions for R&D activities

    Open Research Data
    open access

    The following research data contains the answers of 259 entrepreneurs to questions regarding tax reliefs and exemptions for research and development activities. As part of the study answers to the following questions were obtained:Have you ever used the tax relief for new technologies / R&D?Has your company acquired a license / software (intangible...

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Full text to download in external service