Search results

1 – 10 of 10
Article
Publication date: 13 April 2012

Mohamed El‐Attar

Security is a vital requirement for software systems. Misuse case models allow system designers to inject security considerations within their designs early in the development…

Abstract

Purpose

Security is a vital requirement for software systems. Misuse case models allow system designers to inject security considerations within their designs early in the development cycle rather than patching an end system with security mechanisms after it was developed. The notation and syntactical rules of misuse case models are relatively simple. However, misuse case modeling practitioners are highly vulnerable to modeling pitfalls, creating defective models that can have catastrophic effects downstream in the development cycle. This paper seeks to present a framework that unitizes antipatterns to help remedy defective misuse case models and poor modeling practices.

Design/methodology/approach

A repository of antipatterns was constructed and formatted to be machine‐readable whenever possible so that it can be utilized by the proposed framework. The feasibility of the proposed approach was then demonstrated using a real‐world misuse case model of an online bookstore system.

Findings

The results indicate that the overall quality and clarity of the bookstore misuse case model is improved by applying the proposed technique and framework.

Research limitations/implications

This research work presents a series of domain‐independent antipatterns. Users of this framework may be interested to develop domain‐dependent antipatterns to better suit their modeling and development needs.

Originality/value

The proposed approach will help misuse case modelers, especially novice ones, to improve the quality of their current models as well as future models.

Details

Business Process Management Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 1 January 2003

Richard A. McGowan and John F. Mahon

Game Theory has become an integral part of the business school curriculum, but the popular business press ignores it. Here's a crash course.

Abstract

Game Theory has become an integral part of the business school curriculum, but the popular business press ignores it. Here's a crash course.

Details

Handbook of Business Strategy, vol. 4 no. 1
Type: Research Article
ISSN: 1077-5730

Book part
Publication date: 10 August 2017

Magdalena Nowicka-Franczak

Public acts of self-criticism in Eastern Europe – a genre cultivated and extorted by the communist parties – did not disappear with the end of communism. In the young democracies…

Abstract

Public acts of self-criticism in Eastern Europe – a genre cultivated and extorted by the communist parties – did not disappear with the end of communism. In the young democracies of the region self-criticism has become an attempt to diagnose society’s ‘backward’ character and to develop ‘self-correction’ scenarios in order to participate in the Western modernising discourse. On the one hand, conservative and right-wing elites suppose that public acts of self-criticism (performed by politicians, artists or scholars) can endow the vetting procedures of the ancien régime with a sense of social catharsis and retroactive justice. On the other hand, liberal and left-wing intellectuals subject themselves to collective self-reckoning, not only with their choices made in the transition period, but also with the memory of WWII, in order to shape a civil society free of anti-Semitism and intolerance. An analysis based on the discourse-historical approach in critical discourse analysis, Reinhart Koselleck’s historical semantics and Michel Foucault’s notion of discourse, and carried out on the text corpus of selected acts of self-criticism in Poland, aims to diagnose the role these acts had in shaping public discourse on the troublesome past.

Details

National Identity and Europe in Times of Crisis
Type: Book
ISBN: 978-1-78714-514-6

Keywords

Book part
Publication date: 10 May 2023

Shazib Ahmad, Saksham Mishra and Vandana Sharma

Purpose: Green computing is a way of using the computer resource in an eco-friendly while maintaining and decreasing the harmful environmental impact. Minimising toxic materials…

Abstract

Purpose: Green computing is a way of using the computer resource in an eco-friendly while maintaining and decreasing the harmful environmental impact. Minimising toxic materials and reducing energy usage can also be used to recycle the product.

Need for the Study: The motivation of the study is to use green computing resources to decrease carbon emissions and their adverse effect on the environment.

Methodology: The study uses a qualitative method of collecting resources and data to address the opportunities, challenges, and future trends in green computing for Sustainable Future Technologies. The study focusses on multiple kinds of cloud computing services collected and executed into single remote servers. The service demand processor offers these services to the client per their needs. The simultaneous requests to access the cloud services, processing and expertly managing these requests by the processors are discussed and analysed.

Findings: The findings suggest that green computing is an upcoming and most promising area. The number of resources employed for green computing can be beneficial for lowering E-waste so that computing can be environmentally friendly and self-sustainable.

Practical Implications: Green computing applies across all industries and service sectors like healthcare, entertainment, tourism, and education. The convergence of technologies like Cloud Computing, AI, and Internet of Things (IoT) is greatly impacting Green Supply Chain Management (GSCM) market.

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Keywords

Article
Publication date: 9 November 2020

Fuad Sameh Alshraiedeh and Norliza Katuk

Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns problem, which may diminish the sustainability of the services. The anti-patterns problem…

Abstract

Purpose

Many REpresentational State Transfer (RESTful) Web services suffered from anti-patterns problem, which may diminish the sustainability of the services. The anti-patterns problem could happen in the code of the programme or the uniform resource identifiers (URIs) of RESTful Web services. This study aims to address the problem by proposing a technique and an algorithm for detecting anti-patterns in RESTful Web services. Specifically, the technique is designed based on URIs parsing process.

Design/methodology/approach

The study was conducted following the design science research process, which has six activities, namely, identifying problems, identifying solutions, design the solutions, demonstrate the solution, evaluation and communicate the solution. The proposed technique was embedded in an algorithm and evaluated in four phases covering the process of extracting the URIs, implementing the anti-pattern detection algorithm, detecting the anti-patterns and validating the results.

Findings

The results of the study suggested an acceptable level of accuracy for the anti-patterns detection with 82.30% of precision, 87.86% of recall and 84.93% of F-measure.

Practical implications

The technique and the algorithm can be used by developers of RESTful Web services to detect possible anti-pattern occurrences in the service-based systems.

Originality/value

The technique is personalised to detect amorphous URI and ambiguous name anti-patterns in which it scans the Web service URIs using specified rules and compares them with pre-determined syntax and corpus.

Article
Publication date: 16 February 2023

Vibha Verma, Sameer Anand and Anu Gupta Aggarwal

The software development team reviews the testing phase to assess if the reliability growth of software is as per plan and requirement and gives suggestions for improvement. The…

Abstract

Purpose

The software development team reviews the testing phase to assess if the reliability growth of software is as per plan and requirement and gives suggestions for improvement. The objective of this study is to determine the optimal review time such that there is enough time to make judgments about changes required before the scheduled release.

Design/methodology/approach

Testing utilizes majority of time and resources, assures reliability and plays a critical role in release and warranty decision-making reviews necessary. A very early review during testing may not give useful information for analyzing or improving project performance, and a very late review may delay product delivery and lead to opportunity loss for developers. Therefore, it is assumed that the optimal time for review is in the later stage of testing when the fault removal rate starts to decline. The expression for this time point is determined using the S-curve 2-D software reliability growth model (SRGM).

Findings

The methodology has been illustrated using the real-life fault datasets of Tandem computers and radar systems resulting in optimal review time of 14 weeks and 26 months, respectively, which is neither very early in testing nor very near to the scheduled release. The developer can make changes (more resources or postpone release) to expedite the process.

Originality/value

Most of the literature studies focus on determination of optimal testing or release time to achieve considerable reliability within the budget, but in this study, the authors determine the optimal review time during testing using SRGM to ensure the considerable reliability at release.

Details

International Journal of Quality & Reliability Management, vol. 40 no. 9
Type: Research Article
ISSN: 0265-671X

Keywords

Open Access
Article
Publication date: 18 July 2023

Tomasz Mucha, Sijia Ma and Kaveh Abhari

Recent advancements in Artificial Intelligence (AI) and, at its core, Machine Learning (ML) offer opportunities for organizations to develop new or enhance existing capabilities…

1449

Abstract

Purpose

Recent advancements in Artificial Intelligence (AI) and, at its core, Machine Learning (ML) offer opportunities for organizations to develop new or enhance existing capabilities. Despite the endless possibilities, organizations face operational challenges in harvesting the value of ML-based capabilities (MLbC), and current research has yet to explicate these challenges and theorize their remedies. To bridge the gap, this study explored the current practices to propose a systematic way of orchestrating MLbC development, which is an extension of ongoing digitalization of organizations.

Design/methodology/approach

Data were collected from Finland's Artificial Intelligence Accelerator (FAIA) and complemented by follow-up interviews with experts outside FAIA in Europe, China and the United States over four years. Data were analyzed through open coding, thematic analysis and cross-comparison to develop a comprehensive understanding of the MLbC development process.

Findings

The analysis identified the main components of MLbC development, its three phases (development, release and operation) and two major MLbC development challenges: Temporal Complexity and Context Sensitivity. The study then introduced Fostering Temporal Congruence and Cultivating Organizational Meta-learning as strategic practices addressing these challenges.

Originality/value

This study offers a better theoretical explanation for the MLbC development process beyond MLOps (Machine Learning Operations) and its hindrances. It also proposes a practical way to align ML-based applications with business needs while accounting for their structural limitations. Beyond the MLbC context, this study offers a strategic framework that can be adapted for different cases of digital transformation that include automation and augmentation of work.

Article
Publication date: 1 April 2005

J. Art Gowan and Richard G. Mathieu

The literature on software project management is extended into the broader domain of large‐scale IS management by studying enterprise‐wide system upgrade projects. In particular;…

5607

Abstract

Purpose

The literature on software project management is extended into the broader domain of large‐scale IS management by studying enterprise‐wide system upgrade projects. In particular; examines the role that the intervention of project management practices (formal project methodologies and outsourcing) play in large and/or complex IS projects, which result in good project performance.

Design/methodology/approach

A survey instrument was completed by 449 information systems managers about a specific upgrade project. The primary analytical approach used was structural equation modeling (SEM).

Findings

It was found that neither project complexity nor project size are good indicators of meeting a project's target date. Large projects that adopted formal project management practices were more probable to meet the project target date. Projects with a high degree of complexity which involved outsourcing and adopted formal project management practices, were more likely to meet the project target date.

Practical implications

Clearly, the message to managers of IS projects is to establish a project methodology, especially in large, enterprise‐wide projects, and when some degree of outsourcing is required.

Research limitations/implications

Future research should consider additional measures of performance such as cost, end‐user satisfaction and business value.

Originality/value

Much had been written in the literature about how large, complex IT projects have high failure rates. Our study provides conclusive evidence that, the greater the degree of methodology implementation, the greater the chance for meeting the project's target date. Prior to this research, this had not been explicitly shown in the research literature.

Details

Journal of Enterprise Information Management, vol. 18 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 October 2006

David G. Rosado, Carlos Gutiérrez, Eduardo Fernández‐Medina and Mario Piattini

The purpose of this paper is that of linking security requirements for web services with security patterns, both at the architectural and the design level, obtaining in a…

2490

Abstract

Purpose

The purpose of this paper is that of linking security requirements for web services with security patterns, both at the architectural and the design level, obtaining in a systematic way a web services security software architecture that contains a set of security patterns, thus ensuring that the security requirements of the internet‐based application that have been elicited are fulfilled. Additionally, the security patterns are linked with the most appropriate standards for their implementation.

Design/methodology/approach

To develop secure WS‐based applications, one must know the main security requirements specified that applications have to fulfil and find appropriate security patterns that assure, through combination or relationships between them, the fulfilment of the implicated security requirements. That is why a possible link or connection between requirements and patterns will have to be found, attempting to select for a determined security requirement the best security patterns that solve this requirement, thus guaranteeing the security properties for internet‐based applications.

Findings

Using security patterns, that drive and guide one towards a secure development as well as towards security software architecture, one can be sure that this design based on these patterns fulfils and guarantees the most important security requirements of the internet‐based applications through the design and implementation of security solutions that provide reliable security services.

Practical implications

Security architecture for internet‐based applications and web services can be designed considering the security requirement types that it must fulfil and using the most appropriate security patterns.

Originality/value

This paper proposes a relationship between security requirements that can be specified for internet‐based applications and the possible security patterns that can be used in the design and implementation of the secure system based on the internet, guaranteeing that these security requirements are fulfilled.

Details

Internet Research, vol. 16 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 2 September 2019

Zouhaier Brahmia, Fabio Grandi and Rafik Bouaziz

Any XML schema definition can be organized according to one of the following design styles: “Russian Doll”, “Salami Slice”, “Venetian Blind” and “Garden of Eden” (with the…

Abstract

Purpose

Any XML schema definition can be organized according to one of the following design styles: “Russian Doll”, “Salami Slice”, “Venetian Blind” and “Garden of Eden” (with the additional “Bologna” style actually representing absence of style). Conversion from a design style to another can facilitate the reuse and exchange of schema specifications encoded using the XML schema language. Without any computer-aided engineering support, style conversions must be performed very carefully as they are difficult and error-prone operations. The purpose of this paper is to efficiently deal with such XML schema design style conversions.

Design/methodology/approach

A general approach, named StyleVolution, for automatic management of XML schema design style conversions, is proposed. StyleVolution is equipped with a suite of seven procedures: four for converting a valid XML schema from any other design style to the “Garden of Eden” style, which has been chosen as a normalized XML schema format, and three for converting from the “Garden of Eden” style to any of the other desired design styles.

Findings

Procedures, algorithms and methods for XML schema design style conversions are presented. The feasibility of the approach has been shown through the encoding (using the XQuery language) and the testing (with the Altova XMLSpy 2019 tool) of a suite of seven ready-to-use procedures. Moreover, four test procedures are provided for checking the conformance of a given input XML schema to a schema design style.

Originality/value

The proposed approach implements a new technique for efficiently managing XML schema design style conversions, which can be used to make any given XML schema file to conform to a desired design style.

Details

International Journal of Web Information Systems, vol. 16 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 10