Survey papers software engineering
To browse Academia. Skip to main content. By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. Log In Sign Up. Design Process Model Software engineering Followers. Recent papers in Design Process Model Software engineering. Papers People. Save to Library. Software process modeling for an educational software engineering simulation game.
Software assets are key output of the RAGE project and they can be used by applied game developers to enhance the pedagogical and educational value of their games.
These software assets cover a broad spectrum of functionalities — from These software assets cover a broad spectrum of functionalities — from player analytics including emotion detection to intelligent adaptation and social gamification. In order to facilitate integration and interoperability, all of these assets adhere to a common model, which describes their properties through a set of metadata.
In this paper the RAGE asset model and asset metadata model is presented, capturing the detail of assets and their potential usage within three distinct dimensions — technological, gaming and pedagogical. The paper highlights key issues and challenges in constructing the RAGE asset and asset metadata model and details the process and design of a flexible metadata editor that facilitates both adaptation and improvement of the asset metadata model. In the object oriented paradigm, the class concept allows us to abstract a collection of objects sharing the same structural and behavioral knowledge.
Structural knowledge describes the static structure of objects and behavioral knowledge Structural knowledge describes the static structure of objects and behavioral knowledge describes messages that can be processed by objects.
This article proposes a new kind of knowledge which describes construction process of complex and composite objects, in. These changes can be attributed to In this paper, the authors introduce a novel method of optimizing using integer programming IP. In this paper, Julia Allen defines the scope of governance concern as they apply to security. This paper describes a proposal for integrating Verified Design by Contract into PSP in order to reduce the amount of defects present at the Unit Testing phase, while preserving or improving productivity.
This technical note explores application virtualization as a more lightweight alternative to VM synthesis for cloudlet provisioning. This paper reviews the perils of insufficiently engaging key software domain experts during program development. This white paper presents an improvement strategy comprising four pillars of an integrate-then-build practice that lead to improved quality through early defect discovery and incremental end-to-end validation and verification.
In this paper, the authors describe how state-of-the-art multi-media technologies were used to develop the MERIT InterActive training simulator. In this report, the authors describe a model that helps create a foundation for assessing and advancing the capability of software assurance professionals. In this report, the authors present methods for detecting and preventing data exfiltration using a Linux-based proxy server in a Microsoft Windows environment.
In this report, the authors present results of the Malware Analysis Lexicon MAL initiative, which developed the first common vocabulary for malware analysis. In this report, the authors present methods for auditing USB device use in a Microsoft Windows environment. This study, known as the Cyber Intelligence Tradecraft Project CITP , seeks to advance the capabilities of organizations performing cyber intelligence by elaborating on best practices and prototyping solutions to shared challenges.
In this report, the authors present methods for controlling removable media devices in a MS Windows environment. Examples cover diverse domains and show the kind of improvements you can achieve using a product line approach. This document describes the activities and practices in which an organization must be competent before it can benefit from fielding a product line of software systems.
In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line. This report describes the data collection and analysis process used to support the assessment of project performance for the systems engineering SE effectiveness study. In this report, the authors describe research aimed at helping organizations to know the business value of implementing resilience processes and practices.
In this report, the authors define insider threats and outline current insider threat patterns and trends. The TSP Symposium was organized by the SoThe goal of the TSP Symposium is to bring together practitioners and academics who share a common passion to change the world of software engineering for the better through disciplined practice. This paper discusses the natural tension between rapid fielding and response to change characterized as agility and DoD information assurance policy.
Data for the paper was gathered through interviews with DoD project managers and IA representatives. This report discusses the reliability validation and improvement framework developed by the SEI. The purpose of this framework is to provide a foundation for addressing the challenges of qualifying increasingly software-reliant, safety-critical systems. This report summarizes the results of a survey that had the goal of quantifying the connection between the application of systems engineering SE best practices to projects and programs and the performance of those projects and programs.
Analysis revealed strong relationships between project performance and best practices. In this paper, the authors explain the history and evolution of and applications for maturity models. This article discusses the technical debt metaphor and considers it beyond a "rhetorical concept.
This report documents the program and outcomes of presentations and working groups from Dagstuhl Seminar , "Architecture-Driven Semantic Analysis of Embedded Systems. In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization. This report explores the role of standards in cloud-computing interoperability. It covers cloud-computing basics and standard-related efforts, discusses several use cases, and provides recommendations for cloud-computing adoption.
This technical note presents a strategy to overcome the challenges of obtaining sufficient computation power to run applications needed for warfighting and disaster relief missions. It discusses the use of cloudlets-- localized, stateless servers running one or more virtual machines--on which soldiers can offload resource-intensive computations from their handheld mobile devices.
In this report, Allen Householder describes an algorithm for reverting bits from a fuzzed file to those found in the original seed file to recreate the crash. When warfighting missions are conducted in a dynamic environment, the allocation of resources needed for mission operation can change from moment to moment. This report addresses two challenges of resource allocation in dynamic environments: overstatement of resource needs and unpredictable network availability.
In this report, the authors describe the Competency Lifecycle Roadmap CLR , a preliminary roadmap for understanding and building workforce readiness. In this report, the authors describe three factors for helping or hindering the cooperation of incident responders. In this report, the authors present a framework for thinking about confidence in assurance case arguments. In this report, the authors describe an algorithm for automating the selection of seed files and other parameters used in black-box fuzz testing.
This report describes the line-funded exploratory new starts LENS projects that were undertaken during fiscal year For each project, the report presents a brief description and a recounting of the research that was done, as well as a synopsis of the results of the project. In this report, the authors provide a step-by-step guide for profiling and discovering public-facing assets on a network using netflow data.
In this paper, the authors explain how cloud computing related insider threats are a serious concern, but that this threat has not been thoroughly explored. In this report, the authors describe insights and risk indicators of malicious insider activity in the banking and finance sector. In this report, the authors provide guidance for helping DoD acquisition programs address software security in acquisitions. This report uses a preliminary system dynamics model to analyze a specific adverse acquisition dynamic concerning the poorly controlled evolution of small prototype efforts into full-scale systems.
In this paper, the authors discuss the effects of the changing operational environment on the development of secure systems. In this paper, Samuel Redwine introduces security concepts and tools useful for modeling security properties. In this paper, the authors provide a bibliography of sources related to security. This report presents the Virtual Upgrade Validation VUV method, an approach that uses architecture-centric, model-based analysis to identify system-level problems early in the upgrade process to complement established test qualification techniques.
In this report, the authors present techniques for helping organizations plan, prepare, and implement means to mitigate insider theft of intellectual property. In this paper, the authors describe an approach for deriving measures of software security from well-established and commonly used standard practices. In this report, David Fisher provides substance and explicit meaning to the terms trust and trustworthy as they relate to automated systems.
In this paper, the authors describe an approach for deriving measures of software security from common standard practices for information security. In this report, the authors present the concepts of a risk-based approach to software security measurement and analysis and describe the IMAF and MRD.
In this report, the authors describe the Mission Risk Diagnostic MRD method, which is used to assess risk in systems across the lifecycle and supply chain. This report contains a collection of presentations given at FloCon in January In this paper, Jonathan Spring models internet competition on large, decentralized networks using a modification of Lanchester's equations for combat.
In this paper, the authors demonstrate that there are name servers that exhibit IP address flux, a behavior that falls outside the prescribed parameters. In this paper, Rich Caralli discusses how using maturity models and characterizing security posture are activities with different intents, outcomes, and uses. In this paper, the authors describe preliminary results of a study of how effective nine autonomous incident response organizations are.
This report describes some of the challenges of software versioning in an SOA environment and provides guidance on how to meet these challenges by following industry guidelines and recommended practices.
This report describes a proposed model through which to understand interoperability in the e-government context. In this report, Christopher King provides a snapshot of who malicious insiders are, what and how they strike, and why. The information in this report is intended to help program managers reason about actions they may need to take to adapt and comply with the Section NDAA for and associated guidance.
In this report, the authors describe work to develop standards for automated remediation of vulnerabilities and compliance issues on DoD networked systems.
In this report, the authors describe how implementation-level processes can provide context for identifying and defining measures of operational resilience. The method of quantifying uncertainty described in this report synthesizes scenario building, Bayesian Belief Network BBN modeling and Monte Carlo simulation into an estimation method that quantifies uncertainties, allows subjective inputs, visually depicts influential relationships among program change drivers and outputs, and assists with the explicit description and documentation underlying an estimate.
This research demonstrated the effectiveness of various statistical techniques for discovering quantitative data anomalies. This technical note addresses some of the key issues that either must be understood to ease the adoption of Agile or are seen as potential barriers to adoption of Agile in the DoD acquisition context. This technical note focuses on software acquisition and development practices related to the evaluation of products before, during, and after implementation.
In this report, the authors explain how CERT-RMM process areas, industry standards, and codes of practice are used by organizations in an operational setting. In this report, the authors present an insider threat pattern on how organizations can combat insider theft of intellectual property. This document shows a matrix related to Smart Grid Maturity Model levels.
This report summarizes the proceedings from the MESOA workshop and includes the accepted papers that were the basis for the presentations given during the workshop.
In this report, the authors focus on community college courses for software assurance. This guidebook helps acquisition organizations formulate questions for their suppliers related to CMMI.
It also helps organizations interpret responses to identify and evaluate risks for a given supplier. The Smart Grid Maturity Model SGMM is business tool that provides a framework for electric power utilities to help modernize their operations and practices for delivering electricity.
In this paper, the authors describe the risks of being victims of theft, including becoming involved unknowingly in illegal activities over a networked device. A short white paper that provides guidance on selecting the best CMMI model for process improvement. This report presents guidelines for architecting service-oriented systems and the effect of architectural principles on system quality attributes. In this report, the authors describe work to develop standards for vulnerability and compliance remediation on DoD networked systems.
This report describes standard noncommercial software licensing alternatives as defined by U. Government and DoD regulations. It suggests an approach for identifying agency needs for license rights and the license type for various systems.
In this report, the Resilient Enterprise Management REM team suggests a set of top ten strategic measures for managing operational resilience.
In this paper, the authors describe the development of a secure coding module that shows how to capture content, ensure learning, and scale to meet demand.
In this paper, Jonathan Spring presents a set of recommended restrictions and audits to facilitate cloud security. In this report, the authors describe general observations about and a preliminary system dynamics model of insider crime based on our empirical data. In this paper, the authors discuss confidence in system and SoS behavior and how theories can be used to make the assurance process more effective.
This paper describes an analysis of some of the challenges facing one portion of the Electrical Smart Grid in the United States - residential Demand Response DR systems. In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet. The goal of SEI research is to create best practices for architecture and design of systems that take advantage of the cloud, leading to greater system quality from both a consumer and provider perspective.
In this paper, the authors describe a Security Information and Event Management signature for detecting possible malicious insider activity. SEI research will enable the Navy to to develop service-oriented systems that address information dominance priority requirements.
In this report, an update to its counterpart, the authors provide insight that interested organizations and governments can use to develop a national incident management capability. Acquisition practices for the project level that help you get started with CMMI for Acquisition practices without using the whole model.
In this report, the authors provide sample syllabi for the nine core courses in the Master of Software Assurance Reference Curriculum. Learn how to deliver software-reliant products faster and explore ways to use software architecture more effectively.
Learn how to look into the initial steps suggested for delivering software-reliant products faster. This report explores the interdependencies among common language, business goals, and soft-ware architecture as the basis for a common framework for conducting evaluations of software technical solutions.
In this report, the authors provide an overview of techniques used by malicious insiders to steal intellectual property. This report describes results of independent research and development IRAD projects undertaken in fiscal year In this report, Matthew Heckathorn models the approach an attacker would take and provides detection or prevention methods to counter that approach.
In this report, the authors present research to compute the behavior of software with mathematical precision and how this research has been implemented. These papers were presented at FloCon , where participants discussed dark space, web servers, spam, and the susceptibility of DNS servers to cache poisoning.
In this report, Michael Hanley demonstrates how a method for modeling insider crimes can create candidate technical controls and indicators. This report describes the AIM which helps an organization to implement high-performance, high-quality CMMI practices much more quickly than industry norms.
In this report, the authors consider current practices in software supply chain analysis and suggest some foundational practices. In this report, the authors present a taxonomy of operational cyber security risks and its harmonization with other risk and security activities. The network infrastructure for users such as emergency responders or warfighters is wireless, ad hoc, mobile, and lacking in sufficient bandwidth.
This report documents the results from 18 experiments to investigate Adaptive Quality of Service, an approach to enable applications to fulfill their missions despite tactical network infrastructure limitations. ACE methods and the TSP provides an iterative approach for delivering high quality systems on time and within budget.
This report synthesizes presentations, discussions, and outcomes from the "Beyond Technology Readiness Levels for Software" workshop from August This report describes a model commonly used for developing and maintaining a competent cybersecurity workforce, explains some operational limitations associated with that model, and presents a new approach to cybersecurity workforce development.
This report summarizes a workshop on the analysis and evaluation of enterprise architectures that was held at the SEI in April of This paper presents the results of a series of experiments targeted at analyzing the performance impact of adding WS-Security, a common security standard used in IdM frameworks, to SOAP-based web services. Best practices in the model focus on activities for initiating and managing the acquisition of products and services to meet the needs of customers and end users.
This report explores the value of enhancing typical strategic planning techniques with the CSF method and scenario planning. This paper outlines a research agenda in bridging to the economic theory of mechanism design, which seeks to align incentives in multi-agent systems with private information and conflicting goals. This paper seeks to help organizations understand cloud computing essentials, including drivers for and barriers to adoption, in support of making decisions about adopting the approach.
The goal of the paper is to establish a baseline of terms for service-oriented systems. The purpose of this report is to examine a set of claims about cloud computing adoption. The purpose of this report is to present an informal survey of technologies that are, or are likely to become, important for software-reliant systems of systems in response to current computing trends.
In this report, the authors address how to measure software security in complex environments using the Integrated Measurement and Analysis Framework IMAF. In this report, the authors discuss how security requirements engineering can incorporate reusable requirements.
In this report, the authors begin a dialogue and establish a foundation for measuring and analyzing operational resilience.
This report documents ideas and recommendations for improving the overall acquisition process and presents the actions taken by project managers in several programs to develop, staff, and obtain approval for their systems.
This report describes key elements in systems thinking, provides an introduction to general systems archetypes, and applies these concepts to the software acquisition domain. This report presents the Building Assured Systems Framework BASF that addresses the customer and researcher challenges of selecting security methods and research approaches for building assured systems. A set of measures was determined that allow analyses This report discusses the application of a set of measures to a data set of 41 TSP projects from an organization to identify their strengths and weaknesses.
Some basics of software product line practice, the challenges that make product line acquisition unique, and three basic acquisition strategies are all part of this white paper. In this paper, the authors describe issues encountered in designing and implementing YAF.
In this paper, Rhiannon Weaver describes a population study of malware files under the CTLC framework and presents a simulation study as well as future work.
In this report, the authors present a master of software assurance curriculum that educational institutions can use to create a degree program or track.
In this report, the authors specify 1 a framework that documents best practice for risk management and 2 an approach for evaluating a program's risk management practice in relation to the framework.
In this report, the authors describe seven courses for an undergraduate curriculum specialization for software assurance. In this report, the authors describe the SEI Assurance Modeling Framework, piloting to prove its value, and insights gained from that piloting. In this report, the authors present COVERT, an automated framework for finding buffer overflows in C programs using software verification tools and techniques.
In this paper, Nancy Mead how a systematic approach to security requirements engineering helps to avoid problems. In this report, the authors explore how the SQUARE process can be adapted for privacy requirements engineering in software development.
This report describes a series of ongoing research efforts that investigate the role of interdependence in the acquisition of major defense acquisition programs.
In this paper, Phil Groce describes the Rayon visualization toolkit, developed to augment network analytic information and improve analytic operations. In this paper, Ed Stoner describes techniques for detecting certain types of malicious traffic. In this report, the authors provide insight that interested organizations and governments can use to develop a national incident management capability. In this report, the authors describe the Survivability Analysis Framework, which is used to evaluate critical operational capabilities.
This report synthesizes presentations and discussions from a workshop to discuss product line practices and operational accomplishments. This report describes results from two recent surveys conducted by the Software Engineering Institute SEI to collect information about the measurement and analysis activities of software systems development organizations. This paper explains a formal overload-resilience metric called ductility.
In this paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is detrimental to success. This paper describes the characteristics of edge systems and the edge organizations in which these systems operate, and make initial recommendations about how such systems and organizations can be created to serve the needs of users at the edge. This report highlights the mutual benefits of combining systematic reuse approaches from product line development with flexible approaches for implementing business processes in a service oriented architecture.
In this report, the authors identify software supply chain security risks and specify evidence to gather to determine if these risks have been mitigated. The purpose of this report is to facilitate better elicitation of high-pedigree quality attribute requirements.
Toward this end, we want to be able to elicit business goals reliably and understand how those business goals influence quality attribute requirements and architectures. This report describes how AADL support an instantiation of a reference architecture, address architectural themes, and provide a foundation for the analysis of performance elements and system assurance concerns.
In this report, Rhiannon Weaver describes a method for identifying network behavior that may be a sign of coming internet-wide attacks. In this report, the authors describe a managed string library for the C programming language. This report explores the questions: Can Agile be used in the DoD environment? If so, how? In this report, the authors present the as-if infinitely ranged AIR integer model, a mechanism for eliminating integral exceptional conditions.
This report examines how data rights issues were addressed in the TSAT program. It also reviews concerns posed by the use of commercial software in the TSAT program's Space Segment, and data rights concerns for software incorporated in the GPS program. This report focuses on both qualitative and quantitative ways of determining the current state of SWP software performance in terms of both test coverage and confidence for SOA-based SoS environments.
This paper, extracted from the CERT Research Report, describes planned research tasks in the field of software security. This paper, extracted from the CERT Research Report, describes planned research tasks in the field of cyber assurance. In this paper, the authors discuss how system engineers are uncertain about how to determine the impact of software on overall system.
This report describes the agenda of an SEI-led group that was formed to explore the business, engineering, and operations aspects of service-oriented architecture.
This report makes 65 recommendations for improving testing in service-oriented environments. It covers testing functionality and testing for interoperability, security, performance, and reliability qualities. In this report, Carol Sledge identifies challenges and successful approaches to achieving system of systems SoS interoperability. In this paper, Vincenzo Iozzo describes how to effectively fuzz with no knowledge of the user-input and the binary.
In this paper, Rhiannon Weaver estimates the number of active machines per hour infected with the Conficker-C worm using a probability model. In this paper, the authors present the as-if infinitely ranged AIR integer model, which provides a mechanism for eliminating integral exceptional conditions. In this report, the authors focus on cases in which the insider was employed by a trusted business partner of the victim organization.
This technical note identifies and describes the characteristics that have been used in various definitions of the term system of systems. When problems are detected in programs, everyone needs to listen and work together towards a solution.
Shooting the messenger only delays the process, and hurts program morale. In this paper, Peter Feiler describes the AADL, an industry standard for modeling and analyzing the architecture of software-reliant systems. This report summarizes the results from the second and third high maturity measurement and analysis workshops.
The report examines the application of the life-cycle architecture milestone to the software and computing elements of the former Future Combat Systems program. In this paper, the authors propose the use of secure coding standards in the development of software for surface combatants and submarines. This plan is a government-provided customizable document that is part of the acquisition's government reference library. This technical note proposes a structured approach for reviewing architecture documentation that is centered on the documentation's stakeholders and engages them in a guided manner so as to ensure that the documentation will be ultimately useful to them.
This report presents the criteria used during a MAID evaluation that serve as a checklist to rate the quality of an organization's measurement and analysis practices and the quality of the measurement information that results from the implementation of those practices. This white paper explores the idea that subway maps provide a good, common example of architecture documentation and that they might be instructive about good software architecture documentation.
This white paper describes SEI investigation into ways to provide justified confidence that a system of systems will behave as needed in its actual and evolving usage environments. This paper provides a framework for evaluating a system from several perspectives for a comprehensive picture of progress and quality.
This report describes the fundamental concepts of process performance models PPMs and describes how they can be created using data generated by projects following the TSP. This report introduces key concepts of the SAVI paradigm and discusses the series of development scenarios used in a POC demonstration to illustrate the feasibility of improving the quality of software-intensive aircraft systems. The software community has been slow to use data to measure software quality.
This paper discusses the reasons for this problem and describes a way to use process measurements to assess product quality. When time and budget are tight, it's tempting to follow the "happy path" in testing. But be careful: it may be a path that brings your program great unhappiness. This April whitepaper focuses on the problems of underspending, which can result in funds being shifted from one acquisition program to another.
This report examines the reasons why some programs fail and studies the factors that lead to program success. This special report provides a bibliography of books, articles, and other literature concerning the PSP and TSP methodologies. In this report, the authors explore how to enable manufacturers and federal regulators gain confidence in software-dominated medical devices. This report describes the data model as an architectural style in an effort to help architects apply this style to create data model architectural views.
In this report, the authors describe a set of general solutions to software security problems that can be applied in many different situations. This paper summarizes the comparison performed between the CMMI and the regulations and standards that drive software intensive medical device product development. This report contains a series of observations and their associated lessons learned from a large, multi-segment, software-intensive system.
This guidebook defines the structure and format of the mentor and provisional coach relationship, and explains the process steps and evaluation criteria for becoming an SEI-Certified TSP Coach or Mentor Coach. The Personal Software Process PSP body of knowledge BOK provides guidance to software professionals who are interested in using proven-effective, disciplined methods to improve their personal software development process. This report describes a technique for formulating the production strategy of a production system.
Tactics are fundamental elements of software architecture that an architect employs to meet a system's quality requirements. This report describes an updated set of tactics that enable the architect to build availability into a system. In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data. One of the most intractable problems in software is getting engineers to consistently use effective methods.
The Software Engineering Institute has worked on this problem for a number of years and has developed effective methods for addressing it. In this paper, the authors describe the purpose of Communications: to develop, deploy, and manage communications to support resiliency activities and processes. This technical note provides guidance on how to contractually incorporate architecture evaluations in an acquisition.
This report describes a collaboration between the SEI and Ericsson Research and Development to build a business case using high maturity measurement approaches that require limited measurement effort. The findings suggest that Q Methodology may prove helpful in isolating many of the non-technical latent cost factors associated with system integration and interoperability. In this report, the authors focus on employees, contractors, and business partners who stole intellectual property to benefit a foreign entity.
This paper provides an introduction to the CSA approach, provides behavioral requirements for security attributes, and discusses possible application of the CSA approach. This report summarizes the findings of a study conducted for the Army to find and describe software measurement practices that are being used successfully.
Organizations can make the available SOA governance frameworks more effective in their organizations using the scenario-based tailoring technique introduced in this technical note. Bachmann et al present their work on a design assistant called ArchE that provides third-party researchers with an infrastructure to integrate their own quality-attribute models. The report defines and communicates software engineering and management events necessary to support the successful acquisition of software-intensive systems.
In this paper, the authors present an example to show the value a dependability case adds to a traditional hazard analysis. The paper discusses risk detection and mitigation metrics and design check lists for real time and embedded systems. This paper discusses the application of assurance cases as a means of building confidence that the software design of a complex system of systems will actually meet the operational objectives set forth in the project's top-level requirements.
Planning for a long development period doesn't always solve acquisition scheduling problems. Sometimes it makes them worse. This April whitepaper is one in a short series of acquisition failures. This paper focuses on the problems of underspending, which can result in funds being shifted from one program to another. In this report, the authors provide advice for those making a business case for building software assurance into software products during software development.
This report summarizes a June architecture competence workshop where practitioners discussed key issues in assessing architecture competence in organizations. This report features a systemic approach for managing risk that takes into account the complex nature of distributed environments. This report is a synthesis of the presentations and discussions that took place during the U. Army Software Product Line Workshop. When projects attempt to please too many customers, complexity mounts, schedules slip, costs expand In this report, the authors focus on insider threat cases in which the insider had relationships with the internet underground community.
This report confirms that various architectural genres enjoy more commonalities than differences. Each one has its own important knowledge base, and openness among the various architectural tasks within an organization is growing in importance. This report communicates status, progress, lessons learned, and next steps for the Mexican TSP Initiative. In this report, the authors describe the value of multi-view decision making, a set of practices that reflect the realities of complex development efforts.
The virtual agile enterprise: Making the most of a software engineering course. Soft competency requirements in requirements engineering, software design, implementation, and testing. Assessing attitude towards, knowledge of, and ability to apply, software development process. View 1 excerpt, references background. Process improvement competencies for IS professionals: a survey of perceived needs.
An evaluation of factors affecting professional obsolescence of information technology professionals. Psychology, Computer Science. The effects of roles and personality characteristics on software development team effectiveness. The objective of this research is to show the utility of roles and personality characteristics to the evaluation and formation of software development teams.
The goals of this research include … Expand. This ninth edition of the best-selling "Handbook of Human Resource Management Practice" has been fully updated to take account of the latest developments in HRM.
Entailing every aspect of the human … Expand. View 2 excerpts, references background. A cognitive view of how IT professionals update their technical skills. That course and four … Expand.
0コメント