SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "db:Swepub ;lar1:(bth);pers:(Petersen Kai)"

Sökning: db:Swepub > Blekinge Tekniska Högskola > Petersen Kai

  • Resultat 1-10 av 127
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Alégroth, Emil, 1984-, et al. (författare)
  • Characteristics that affect Preference of Decision Models for Asset Selection : An Industrial Questionnaire Survey
  • 2020
  • Ingår i: Software quality journal. - : Springer. - 0963-9314 .- 1573-1367. ; 28:4, s. 1675-1707
  • Tidskriftsartikel (refereegranskat)abstract
    • Modern software development relies on a combination of development and re-use of technical asset, e.g. software components, libraries and APIs.In the past, re-use was mostly conducted with internal assets but today external; open source, customer off-the-shelf (COTS) and assets developed through outsourcing are also common.This access to more asset alternatives presents new challenges regarding what assets to optimally chose and how to make this decision.To support decision-makers, decision-theory has been used to develop decision models for asset selection.However, very little industrial data has been presented in literature about the usefulness, or even perceived usefulness, of these models.Additionally, only limited information has been presented about what model characteristics that determine practitioner preference towards one model over another.Objective: The objective of this work is to evaluate what characteristics of decision models for asset selection that determine industrial practitioner preference of a model when given the choice of a decision-model of high precision or a model with high speed.Method: An industrial questionnaire survey is performed where a total of 33 practitioners, of varying roles, from 18 companies are tasked to compare two decision models for asset selection.Textual analysis and formal and descriptive statistics are then applied on the survey responses to answer the study's research questions.Results: The study shows that the practitioners had clear preference towards the decision model that emphasised speed over the one that emphasised decision precision.This conclusion was determined to be because one of the models was perceived faster, had lower complexity, had, was more flexible in use for different decisions, was more agile how it could be used in operation, its emphasis on people, its emphasis on ``good enough'' precision and ability to fail fast if a decision was a failure.Hence, seven characteristics that the practitioners considered important for their acceptance of the model.Conclusion: Industrial practitioner preference, which relates to acceptance, of decision models for asset selection is dependent on multiple characteristics that must be considered when developing a model for different types of decisions such as operational day-to-day decisions as well as more critical tactical or strategic decisions.The main contribution of this work are seven identified characteristics that can serve as industrial requirements for future research on decision models for asset selection.
  •  
3.
  • Ali, Nauman Bin, et al. (författare)
  • A consolidated process for software process simulation : State of the Art and Industry Experience
  • 2012
  • Konferensbidrag (refereegranskat)abstract
    • Software process simulation is a complex task and in order to conduct a simulation project practitioners require support through a process for software process simulation modelling (SPSM), including what steps to take and what guidelines to follow in each step. This paper provides a literature based consolidated process for SPSM where the steps and guidelines for each step are identified through a review of literature and are complemented by experience from using these recommendations in an action research at a large Telecommunication vendor. We found five simulation processes in SPSM literature, resulting in a seven-step process. The consolidated process was successfully applied at the studied company, with the experiences of doing so being reported.
  •  
4.
  • Ali, Nauman bin, et al. (författare)
  • FLOW-assisted value stream mapping in the early phases of large-scale software development
  • 2016
  • Ingår i: Journal of Systems and Software. - : Elsevier. - 0164-1212 .- 1873-1228. ; 111, s. 213-227
  • Tidskriftsartikel (refereegranskat)abstract
    • Value stream mapping (VSM) has been successfully applied in the context of software process improvement. However, its current adaptations from Lean manufacturing focus mostly on the flow of artifacts and have taken no account of the essential information flows in software development. A solution specifically targeted toward information flow elicitation and modeling is FLOW. This paper aims to propose and evaluate the combination of VSM and FLOW to identify and alleviate information and communication related challenges in large-scale software development. Using case study research, FLOW-assisted VSM was used for a large product at Ericsson AB, Sweden. Both the process and the outcome of FLOW-assisted VSM have been evaluated from the practitioners’ perspective. It was noted that FLOW helped to systematically identify challenges and improvements related to information flow. Practitioners responded favorably to the use of VSM and FLOW, acknowledged the realistic nature and impact on the improvement on software quality, and found the overview of the entire process using the FLOW notation very useful. The combination of FLOW and VSM presented in this study was successful in systematically uncovering issues and characterizing their solutions, indicating their practical usefulness for waste removal with a focus on information flow related issues.
  •  
5.
  • Ali, Nauman Bin, et al. (författare)
  • Testing highly complex system of systems : An industrial case study
  • 2012
  • Ingår i: [Host publication title missing]. - Lund : ACM/IEEE. - 9781450310567 ; , s. 211-220
  • Konferensbidrag (refereegranskat)abstract
    • Systems of systems (SoS) are highly complex and are integrated on multiple levels (unit, component, system, system of systems). Many of the characteristics of SoS (such as operational and managerial independence, integration of system into system of systems, SoS comprised of complex systems) make their development and testing challenging. Contribution: This paper provides an understanding of SoS testing in large-scale industry settings with respect to challenges and how to address them. Method: The research method used is case study research. As data collection methods we used interviews, documentation, and fault slippage data. Results: We identified challenges related to SoS with respect to fault slippage, test turn-around time, and test maintainability. We also classified the testing challenges to general testing challenges, challenges amplified by SoS, and challenges that are SoS specific. Interestingly, the interviewees agreed on the challenges, even though we sampled them with diversity in mind, which meant that the number of interviews conducted was sufficient to answer our research questions. We also identified solution proposals to the challenges that were categorized under four classes of developer quality assurance, function test, testing in all levels, and requirements engineering and communication. Conclusion: We conclude that although over half of the challenges we identified can be categorized as general testing challenges still SoS systems have their unique and amplified challenges stemming from SoS characteristics. Furthermore, it was found that interviews and fault slippage data indicated that different areas in the software process should be improved, which indicates that using only one of these methods would have led to an incomplete picture of the challenges in the case company.
  •  
6.
  • Ali, Nauman, et al. (författare)
  • Evaluating strategies for study selection in systematic literature studies
  • 2014
  • Ingår i: ESEM '14 Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. - New York, NY, USA : ACM. - 9781450327749
  • Konferensbidrag (refereegranskat)abstract
    • Context: The study selection process is critical to improve the reliability of secondary studies. Goal: To evaluate the selection strategies commonly employed in secondary studies in software engineering. Method: Building on these strate- gies, a study selection process was formulated and evalu- ated in a systematic review. Results: The selection process used a more inclusive strategy than the one typically used in secondary studies, which led to additional relevant articles. Conclusions: The results indicates that a good-enough sam- ple could be obtained by following a less inclusive but more efficient strategy, if the articles identified as relevant for the study are a representative sample of the population, and there is a homogeneity of results and quality of the articles.
  •  
7.
  • Baca, Dejan, et al. (författare)
  • Countermeasure graphs for software security risk assessment : An action research
  • 2013
  • Ingår i: Journal of Systems and Software. - : Elsevier. - 0164-1212. ; 86:9, s. 2411-2428
  • Tidskriftsartikel (refereegranskat)abstract
    • Software security risk analysis is an important part of improving software quality. In previous research we proposed countermeasure graphs (CGs), an approach to conduct risk analysis, combining the ideas of different risk analysis approaches. The approach was designed for reuse and easy evolvability to support agile software development. CGs have not been evaluated in industry practice in agile software development. In this research we evaluate the ability of CGs to support practitioners in identifying the most critical threats and countermeasures. The research method used is participatory action research where CGs were evaluated in a series of risk analyses on four different telecom products. With Peltier (used prior to the use of CGs at the company) the practitioners identified attacks with low to medium risk level. CGs allowed practitioners to identify more serious risks (in the first iteration 1 serious threat, 5 high risk threats, and 11 medium threats). The need for tool support was identified very early, tool support allowed the practitioners to play through scenarios of which countermeasures to implement, and supported reuse. The results indicate that CGs support practitioners in identifying high risk security threats, work well in an agile software development context, and are cost-effective.
  •  
8.
  • Baca, Dejan, et al. (författare)
  • Improving software security with static automated code analysis in an industry setting
  • 2013
  • Ingår i: Software, practice & experience. - : Wiley. - 0038-0644 .- 1097-024X. ; 43:3, s. 259-279
  • Tidskriftsartikel (refereegranskat)abstract
    • Software security can be improved by identifying and correcting vulnerabilities. In order to reduce the cost of rework, vulnerabilities should be detected as early and efficiently as possible. Static automated code analysis is an approach for early detection. So far, only few empirical studies have been conducted in an industrial context to evaluate static automated code analysis. A case study was conducted to evaluate static code analysis in industry focusing on defect detection capability, deployment, and usage of static automated code analysis with a focus on software security. We identified that the tool was capable of detecting memory related vulnerabilities, but few vulnerabilities of other types. The deployment of the tool played an important role in its success as an early vulnerability detector, but also the developers perception of the tools merit. Classifying the warnings from the tool was harder for the developers than to correct them. The correction of false positives in some cases created new vulnerabilities in previously safe code. With regard to defect detection ability, we conclude that static code analysis is able to identify vulnerabilities in different categories. In terms of deployment, we conclude that the tool should be integrated with bug reporting systems, and developers need to share the responsibility for classifying and reporting warnings. With regard to tool usage by developers, we propose to use multiple persons (at least two) in classifying a warning. The same goes for making the decision of how to act based on the warning.
  •  
9.
  • Baca, Dejan, et al. (författare)
  • Prioritizing Countermeasures through the Countermeasure Method for Software Security (CM-Sec)
  • 2010
  • Konferensbidrag (refereegranskat)abstract
    • Software security is an important quality aspect of a software system. Therefore, it is important to integrate software security touch points throughout the development life-cycle. So far, the focus of touch points in the early phases has been on the identification of threats and attacks. In this paper we propose a novel method focusing on the end product by prioritizing countermeasures. The method provides an extension to attack trees and a process for identification and prioritization of countermeasures. The approach has been applied on an open-source application and showed that countermeasures could be identified. Furthermore, an analysis of the effectiveness and cost-efficiency of the countermeasures could be provided.
  •  
10.
  • Baca, Dejan, et al. (författare)
  • Static Code Analysis to Detect Software Security Vulnerabilities : Does Experience Matter?
  • 2009
  • Konferensbidrag (refereegranskat)abstract
    • Code reviews with static analysis tools are today recommended by several security development processes. Developers are expected to use the tools' output to detect the security threats they themselves have introduced in the source code. This approach assumes that all developers can correctly identify a warning from a static analysis tool (SAT) as a security threat that needs to be corrected. We have conducted an industry experiment with a state of the art static analysis tool and real vulnerabilities. We have found that average developers do not correctly identify the security warnings and only developers with specific experiences are better than chance in detecting the security vulnerabilities. Specific SAT experience more than doubled the number of correct answers and a combination of security experience and SAT experience almost tripled the number of correct security answers.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 127
Typ av publikation
tidskriftsartikel (59)
konferensbidrag (51)
doktorsavhandling (6)
forskningsöversikt (5)
annan publikation (3)
bokkapitel (2)
visa fler...
licentiatavhandling (1)
visa färre...
Typ av innehåll
refereegranskat (117)
övrigt vetenskapligt/konstnärligt (9)
Författare/redaktör
Börstler, Jürgen, 19 ... (15)
Wohlin, Claes (13)
Mendes, Emilia (9)
Ali, Nauman Bin (8)
Papatheocharous, Efi (8)
visa fler...
Engström, Emelie (7)
Minhas, Nasir Mehmoo ... (7)
Gencel, Cigdem (7)
Wnuk, Krzysztof, 198 ... (6)
Gorschek, Tony, 1972 ... (6)
Mäntylä, Mika (6)
Baca, Dejan (6)
Irshad, Mohsin (6)
Cicchetti, Antonio (5)
Feldt, Robert (5)
Ali, Nauman bin, Dr. (5)
Sentilles, Séverine, ... (5)
Börstler, Jürgen (4)
Carlson, Jan (4)
Ghazi, Ahmad Nauman, ... (4)
Khurum, Mahvish (4)
jabangwe, Ronald (4)
Ciccozzi, Federico, ... (3)
Felderer, Michael, 1 ... (3)
Usman, Muhammad (3)
Axelsson, Jakob (3)
Mattsson, Michael (3)
Ali, Nauman (3)
Fricker, Samuel (3)
Poulding, Simon (3)
Lundberg, Lars (2)
Ghazi, Ahmad Nauman (2)
Torkar, Richard, 197 ... (2)
Šmite, Darja (2)
Bjarnason, Elizabeth (2)
Alégroth, Emil, 1984 ... (2)
Runeson, Per (2)
Carlsson, Bengt (2)
Badampudi, Deepika, ... (2)
Badampudi, Deepika (2)
Barney, Sebastian (2)
Svahnberg, Mikael (2)
Betz, Stefanie (2)
bin Ali, Nauman (2)
Garousi, Vahid (2)
Petersen, Kai, Prof. (2)
Börstler, Jürgen, Pr ... (2)
Shah, Syed Muhammad ... (2)
Jabbari, Ramtin (2)
visa färre...
Lärosäte
Lunds universitet (11)
Mälardalens universitet (10)
RISE (7)
Göteborgs universitet (2)
Örebro universitet (2)
visa fler...
Malmö universitet (2)
Chalmers tekniska högskola (1)
Linnéuniversitetet (1)
visa färre...
Språk
Engelska (127)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (125)
Teknik (10)
Samhällsvetenskap (3)
Humaniora (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy