首页 > 最新文献

Information and Software Technology最新文献

英文 中文
A software product line approach for developing hybrid software systems 开发混合软件系统的软件生产线方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-10 DOI: 10.1016/j.infsof.2024.107625
Samuel Sepúlveda , Ricardo Pérez-Castillo , Mario Piattini

Context:

Quantum computing is rapidly emerging as a transformative force in technology. We will soon increasingly encounter hybrid systems that combine quantum technology with classical software. Software engineering techniques will be required to manage the complexity of designing such systems and their reuse.

Objective:

This paper introduces preliminary ideas concerning developing quantum–classical software using a Software Product Line approach.

Method:

This approach addresses the mentioned challenges and provides a feature model and a whole process to manage variability during the design and development of hybrid quantum–classical software. The usage of this approach is illustrated and discussed using an example in the logistics domain.

Results:

The preliminary insights show the feasibility and suitability of applying the proposed approach to develop complex quantum–classical software.

Conclusions:

The main implication of this research is that it can help to manage complexity, maximize the reuse of classical and quantum software components, and deal with the highly changing technological stack in the current quantum computing field.
背景:量子计算正在迅速崛起,成为技术领域的一股变革力量。我们很快就会遇到越来越多的量子技术与经典软件相结合的混合系统。本文介绍了使用软件产品线方法开发量子经典软件的初步想法。方法:该方法解决了上述挑战,并提供了一个功能模型和一个完整的流程,以管理混合量子经典软件设计和开发过程中的可变性。结论:本研究的主要意义在于,它有助于管理复杂性,最大限度地重复使用经典和量子软件组件,并应对当前量子计算领域高度变化的技术堆栈。
{"title":"A software product line approach for developing hybrid software systems","authors":"Samuel Sepúlveda ,&nbsp;Ricardo Pérez-Castillo ,&nbsp;Mario Piattini","doi":"10.1016/j.infsof.2024.107625","DOIUrl":"10.1016/j.infsof.2024.107625","url":null,"abstract":"<div><h3>Context:</h3><div>Quantum computing is rapidly emerging as a transformative force in technology. We will soon increasingly encounter hybrid systems that combine quantum technology with classical software. Software engineering techniques will be required to manage the complexity of designing such systems and their reuse.</div></div><div><h3>Objective:</h3><div>This paper introduces preliminary ideas concerning developing quantum–classical software using a Software Product Line approach.</div></div><div><h3>Method:</h3><div>This approach addresses the mentioned challenges and provides a feature model and a whole process to manage variability during the design and development of hybrid quantum–classical software. The usage of this approach is illustrated and discussed using an example in the logistics domain.</div></div><div><h3>Results:</h3><div>The preliminary insights show the feasibility and suitability of applying the proposed approach to develop complex quantum–classical software.</div></div><div><h3>Conclusions:</h3><div>The main implication of this research is that it can help to manage complexity, maximize the reuse of classical and quantum software components, and deal with the highly changing technological stack in the current quantum computing field.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107625"},"PeriodicalIF":3.8,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142656358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication 评估攻击防御树的可理解性和用户接受度:原始实验和复制
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-09 DOI: 10.1016/j.infsof.2024.107624
Giovanna Broccia , Maurice H. ter Beek , Alberto Lluch Lafuente , Paola Spoletini , Alessandro Fantechi , Alessio Ferrari

Context:

Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication among different stakeholders involved in system security evaluation and are formal enough to be verified using methods like model checking. The understandability and user-friendliness of ADTs are claimed as key factors in their success, but these aspects, along with user acceptance, have not been evaluated empirically.

Objectives:

This paper presents an experiment with 25 subjects designed to assess the understandability and user acceptance of the ADT notation, along with an internal replication involving 49 subjects.

Methods:

The experiments adapt the Method Evaluation Model (MEM) to examine understandability variables (i.e., effectiveness and efficiency in using ADTs) and user acceptance variables (i.e., ease of use, usefulness, and intention to use). The MEM is also used to evaluate the relationships between these dimensions. In addition, a comparative analysis of the results of the two experiments is carried out.

Results:

With some minor differences, the outcomes of the two experiments are aligned. The results demonstrate that ADTs are well understood by participants, with values of understandability variables significantly above established thresholds. They are also highly appreciated, particularly for their ease of use. The results also show that users who are more effective in using the notation tend to evaluate it better in terms of usefulness.

Conclusion:

These studies provide empirical evidence supporting both the understandability and perceived acceptance of ADTs, thus encouraging further adoption of the notation in industrial contexts, and development of supporting tools.
背景:攻击防御树(ADT)是一种用于建模和评估安全需求的图形符号。ADT 很受欢迎,因为它便于参与系统安全评估的不同利益相关者之间进行交流,而且足够正规,可以使用模型检查等方法进行验证。方法:实验采用方法评估模型(MEM)来检查可理解性变量(即使用 ADT 的有效性和效率)和用户接受度变量(即易用性、有用性和使用意向)。MEM 还用于评估这些维度之间的关系。此外,还对两个实验的结果进行了对比分析。结果表明,ADT 被参与者很好地理解,可理解性变量的值大大高于既定的阈值。此外,ADT 还受到高度评价,尤其是其易用性。结论:这些研究为 ADT 的可理解性和感知接受度提供了实证支持,从而鼓励在工业环境中进一步采用 ADT 并开发辅助工具。
{"title":"Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication","authors":"Giovanna Broccia ,&nbsp;Maurice H. ter Beek ,&nbsp;Alberto Lluch Lafuente ,&nbsp;Paola Spoletini ,&nbsp;Alessandro Fantechi ,&nbsp;Alessio Ferrari","doi":"10.1016/j.infsof.2024.107624","DOIUrl":"10.1016/j.infsof.2024.107624","url":null,"abstract":"<div><h3>Context:</h3><div>Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication among different stakeholders involved in system security evaluation and are formal enough to be verified using methods like model checking. The understandability and user-friendliness of ADTs are claimed as key factors in their success, but these aspects, along with user acceptance, have not been evaluated empirically.</div></div><div><h3>Objectives:</h3><div>This paper presents an experiment with 25 subjects designed to assess the understandability and user acceptance of the ADT notation, along with an internal replication involving 49 subjects.</div></div><div><h3>Methods:</h3><div>The experiments adapt the Method Evaluation Model (MEM) to examine understandability variables (i.e., effectiveness and efficiency in using ADTs) and user acceptance variables (i.e., ease of use, usefulness, and intention to use). The MEM is also used to evaluate the relationships between these dimensions. In addition, a comparative analysis of the results of the two experiments is carried out.</div></div><div><h3>Results:</h3><div>With some minor differences, the outcomes of the two experiments are aligned. The results demonstrate that ADTs are well understood by participants, with values of understandability variables significantly above established thresholds. They are also highly appreciated, particularly for their ease of use. The results also show that users who are more effective in using the notation tend to evaluate it better in terms of usefulness.</div></div><div><h3>Conclusion:</h3><div>These studies provide empirical evidence supporting both the understandability and perceived acceptance of ADTs, thus encouraging further adoption of the notation in industrial contexts, and development of supporting tools.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107624"},"PeriodicalIF":3.8,"publicationDate":"2024-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142656359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the road to interactive LLM-based systematic mapping studies 基于 LLM 的互动式系统制图研究之路
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-31 DOI: 10.1016/j.infsof.2024.107611
Kai Petersen , Jan M. Gerken

Context:

The research volume is continuously increasing. Manual analysis of large topic scopes and continuously updating literature studies with the newest research results is effort intensive and, therefore, difficult to achieve.

Objective:

To discuss possibilities and next steps for using LLMs (e.g., GPT-4) in the mapping study process.

Method:

The research can be classified as a solution proposal. The solution was iteratively designed and discussed among the authors based on their experience with LLMs and literature reviews.

Results:

We propose strategies for the mapping process, outlining the use of agents and prompting strategies for each step.

Conclusion:

Given the potential of LLMs in literature studies, we should work on a holistic solutions for LLM-supported mapping studies.
背景:研究数量不断增加。目标:讨论在制图研究过程中使用 LLMs(如 GPT-4)的可能性和下一步措施。方法:该研究可归类为解决方案建议。结果:我们提出了制图过程的策略,概述了每个步骤的代理和提示策略的使用。结论:鉴于 LLM 在文献研究中的潜力,我们应该为 LLM 支持的制图研究制定整体解决方案。
{"title":"On the road to interactive LLM-based systematic mapping studies","authors":"Kai Petersen ,&nbsp;Jan M. Gerken","doi":"10.1016/j.infsof.2024.107611","DOIUrl":"10.1016/j.infsof.2024.107611","url":null,"abstract":"<div><h3>Context:</h3><div>The research volume is continuously increasing. Manual analysis of large topic scopes and continuously updating literature studies with the newest research results is effort intensive and, therefore, difficult to achieve.</div></div><div><h3>Objective:</h3><div>To discuss possibilities and next steps for using LLMs (e.g., GPT-4) in the mapping study process.</div></div><div><h3>Method:</h3><div>The research can be classified as a solution proposal. The solution was iteratively designed and discussed among the authors based on their experience with LLMs and literature reviews.</div></div><div><h3>Results:</h3><div>We propose strategies for the mapping process, outlining the use of agents and prompting strategies for each step.</div></div><div><h3>Conclusion:</h3><div>Given the potential of LLMs in literature studies, we should work on a holistic solutions for LLM-supported mapping studies.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107611"},"PeriodicalIF":3.8,"publicationDate":"2024-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top-down: A better strategy for incremental covering array generation 自上而下:增量覆盖阵列生成的更好策略
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-30 DOI: 10.1016/j.infsof.2024.107601
Yan Wang , Xintao Niu , Huayao Wu , Changhai Nie , Lei Yu , Xiaoyin Wang , Jiaxi Xu

Context:

The Incremental Covering Array (ICA) offers a flexible and efficient test schedule for Combinatorial Testing (CT) by enabling dynamic adjustment of test strength. Despite its importance, ICA generation has been under-explored in the CT community, resulting in limited and suboptimal existing approaches.

Objective:

To address this gap, we introduce a novel strategy, namely Top-down, for optimizing ICA generation.

Method:

In contrast to the traditional strategy, named Bottom-up, Top-down starts with a higher-strength test set and then extracts lower-strength sets from it, thus leveraging test case generation algorithms more effectively.

Results:

We conducted a comparative evaluation of the two strategies across 17 real-world software with 84 total versions. The results demonstrate that compared with Bottom-up, the Top-down strategy requires less time and generates smaller ICAs while covering more higher-strength interactions. Furthermore, Top-down outperforms Bottom-up in early fault detection and code line coverage, while also surpassing the random and direct CA generation strategies.

Conclusion:

The Top-down strategy not only improved the efficiency of test case generation but also enhanced the effectiveness of fault detection in the incremental testing scenarios.
背景:增量覆盖阵列(ICA)通过动态调整测试强度,为组合测试(CT)提供了灵活高效的测试计划。方法:与传统的自下而上(Bottom-up)策略相比,自上而下(Top-down)策略从强度较高的测试集开始,然后从中提取强度较低的测试集,从而更有效地利用测试用例生成算法。结果:我们在 17 个真实世界软件的 84 个版本中对这两种策略进行了比较评估。结果表明,与 "自下而上 "相比,"自上而下 "策略所需的时间更短,生成的 ICA 更小,同时涵盖的交互强度更高。结论:自上而下策略不仅提高了测试用例生成的效率,还增强了增量测试场景中故障检测的有效性。
{"title":"Top-down: A better strategy for incremental covering array generation","authors":"Yan Wang ,&nbsp;Xintao Niu ,&nbsp;Huayao Wu ,&nbsp;Changhai Nie ,&nbsp;Lei Yu ,&nbsp;Xiaoyin Wang ,&nbsp;Jiaxi Xu","doi":"10.1016/j.infsof.2024.107601","DOIUrl":"10.1016/j.infsof.2024.107601","url":null,"abstract":"<div><h3>Context:</h3><div>The Incremental Covering Array (ICA) offers a flexible and efficient test schedule for Combinatorial Testing (CT) by enabling dynamic adjustment of test strength. Despite its importance, ICA generation has been under-explored in the CT community, resulting in limited and suboptimal existing approaches.</div></div><div><h3>Objective:</h3><div>To address this gap, we introduce a novel strategy, namely <em>Top-down</em>, for optimizing ICA generation.</div></div><div><h3>Method:</h3><div>In contrast to the traditional strategy, named <em>Bottom-up</em>, <em>Top-down</em> starts with a higher-strength test set and then extracts lower-strength sets from it, thus leveraging test case generation algorithms more effectively.</div></div><div><h3>Results:</h3><div>We conducted a comparative evaluation of the two strategies across 17 real-world software with 84 total versions. The results demonstrate that compared with <em>Bottom-up</em>, the <em>Top-down</em> strategy requires less time and generates smaller ICAs while covering more higher-strength interactions. Furthermore, <em>Top-down</em> outperforms <em>Bottom-up</em> in early fault detection and code line coverage, while also surpassing the random and direct CA generation strategies.</div></div><div><h3>Conclusion:</h3><div>The <em>Top-down</em> strategy not only improved the efficiency of test case generation but also enhanced the effectiveness of fault detection in the incremental testing scenarios.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107601"},"PeriodicalIF":3.8,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multivocal literature review on the benefits and limitations of industry-leading AutoML tools 关于业界领先的 AutoML 工具的优势和局限性的多语种文献综述
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-29 DOI: 10.1016/j.infsof.2024.107608
Luigi Quaranta , Kelly Azevedo , Fabio Calefato , Marcos Kalinowski

Context:

Rapid advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing software engineering in every application domain, driving unprecedented transformations and fostering innovation. However, despite these advances, several organizations are experiencing friction in the adoption of ML-based technologies, mainly due to the current shortage of ML professionals. In this context, Automated Machine Learning (AutoML) techniques have been presented as a promising solution to democratize ML adoption, even in the absence of specialized people.

Objective:

Our research aims to provide an overview of the evidence on the benefits and limitations of AutoML tools being adopted in industry.

Methods:

We conducted a Multivocal Literature Review, which allowed us to identify 54 sources from the academic literature and 108 sources from the grey literature reporting on AutoML benefits and limitations. We extracted explicitly reported benefits and limitations from the papers and applied the thematic analysis method for synthesis.

Results:

In general, we identified 18 reported benefits and 25 limitations. Concerning the benefits, we highlight that AutoML tools can help streamline the core steps of ML workflows, namely data preparation, feature engineering, model construction, and hyperparameter tuning—with concrete benefits on model performance, efficiency, and scalability. In addition, AutoML empowers both novice and experienced data scientists, promoting ML accessibility. However, we highlight several limitations that may represent obstacles to the widespread adoption of AutoML. For instance, AutoML tools may introduce barriers to transparency and interoperability, exhibit limited flexibility for complex scenarios, and offer inconsistent coverage of the ML workflow.

Conclusion:

The effectiveness of AutoML in facilitating the adoption of machine learning by users may vary depending on the specific tool and the context in which it is used. Today, AutoML tools are used to increase human expertise rather than replace it and, as such, require skilled users.
背景:人工智能(AI)和机器学习(ML)的快速发展正在彻底改变各个应用领域的软件工程,推动前所未有的变革并促进创新。然而,尽管取得了这些进步,一些组织在采用基于 ML 的技术时却遇到了摩擦,主要原因是目前缺乏 ML 专业人才。在这种情况下,自动机器学习(AutoML)技术被认为是即使在缺乏专业人员的情况下也能实现 ML 应用民主化的一种有前途的解决方案。我们从这些文献中提取了明确报告的优点和局限性,并采用专题分析法进行了综合。结果:总体而言,我们发现了 18 项报告的优点和 25 项局限性。关于益处,我们强调 AutoML 工具可以帮助简化 ML 工作流程的核心步骤,即数据准备、特征工程、模型构建和超参数调整,从而在模型性能、效率和可扩展性方面带来具体益处。此外,AutoML 还能帮助新手和有经验的数据科学家,提高 ML 的可及性。不过,我们也强调了一些可能阻碍 AutoML 广泛应用的局限性。例如,AutoML 工具可能会对透明度和互操作性造成障碍,在复杂场景下表现出有限的灵活性,并且对 ML 工作流的覆盖范围不一致。如今,AutoML 工具被用来提高人类的专业知识,而不是取而代之,因此需要熟练的用户。
{"title":"A multivocal literature review on the benefits and limitations of industry-leading AutoML tools","authors":"Luigi Quaranta ,&nbsp;Kelly Azevedo ,&nbsp;Fabio Calefato ,&nbsp;Marcos Kalinowski","doi":"10.1016/j.infsof.2024.107608","DOIUrl":"10.1016/j.infsof.2024.107608","url":null,"abstract":"<div><h3>Context:</h3><div>Rapid advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing software engineering in every application domain, driving unprecedented transformations and fostering innovation. However, despite these advances, several organizations are experiencing friction in the adoption of ML-based technologies, mainly due to the current shortage of ML professionals. In this context, Automated Machine Learning (AutoML) techniques have been presented as a promising solution to democratize ML adoption, even in the absence of specialized people.</div></div><div><h3>Objective:</h3><div>Our research aims to provide an overview of the evidence on the benefits and limitations of AutoML tools being adopted in industry.</div></div><div><h3>Methods:</h3><div>We conducted a Multivocal Literature Review, which allowed us to identify 54 sources from the academic literature and 108 sources from the grey literature reporting on AutoML benefits and limitations. We extracted explicitly reported benefits and limitations from the papers and applied the thematic analysis method for synthesis.</div></div><div><h3>Results:</h3><div>In general, we identified 18 reported benefits and 25 limitations. Concerning the benefits, we highlight that AutoML tools can help streamline the core steps of ML workflows, namely data preparation, feature engineering, model construction, and hyperparameter tuning—with concrete benefits on model performance, efficiency, and scalability. In addition, AutoML empowers both novice and experienced data scientists, promoting ML accessibility. However, we highlight several limitations that may represent obstacles to the widespread adoption of AutoML. For instance, AutoML tools may introduce barriers to transparency and interoperability, exhibit limited flexibility for complex scenarios, and offer inconsistent coverage of the ML workflow.</div></div><div><h3>Conclusion:</h3><div>The effectiveness of AutoML in facilitating the adoption of machine learning by users may vary depending on the specific tool and the context in which it is used. Today, AutoML tools are used to increase human expertise rather than replace it and, as such, require skilled users.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107608"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using AI-based coding assistants in practice: State of affairs, perceptions, and ways forward 在实践中使用基于人工智能的编码助手:现状、看法和前进方向
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-29 DOI: 10.1016/j.infsof.2024.107610
Agnia Sergeyuk , Yaroslav Golubev , Timofey Bryksin , Iftekhar Ahmed

Context:

The last several years saw the emergence of AI assistants for code — multi-purpose AI-based helpers in software engineering. As they become omnipresent in all aspects of software development, it becomes critical to understand their usage patterns.

Objective:

We aim to better understand how specifically developers are using AI assistants, why they are not using them in certain parts of their development workflow, and what needs to be improved in the future.

Methods:

In this work, we carried out a large-scale survey aimed at how AI assistants are used, focusing on specific software development activities and stages. We collected opinions of 481 programmers on five broad activities: (a) implementing new features, (b) writing tests, (c) bug triaging, (d) refactoring, and (e) writing natural-language artifacts, as well as their individual stages.

Results:

Our results provide a novel comparison of different stages where AI assistants are used that is both comprehensive and detailed. It highlights specific activities that developers find less enjoyable and want to delegate to an AI assistant, e.g., writing tests and natural-language artifacts. We also determine more granular stages where AI assistants are used, such as generating tests and generating docstrings, as well as less studied parts of the workflow, such as generating test data. Among the reasons for not using assistants, there are general aspects like trust and company policies, as well as more concrete issues like the lack of project-size context, which can be the focus of the future research.

Conclusion:

The provided analysis highlights stages of software development that developers want to delegate and that are already popular for using AI assistants, which can be a good focus for features aimed to help developers right now. The main reasons for not using AI assistants can serve as a guideline for future work.
背景:在过去几年中,代码人工智能助手--基于人工智能的软件工程多用途助手--应运而生。目标:我们旨在更好地了解开发人员是如何具体使用人工智能助手的,他们为什么不在开发工作流程的某些部分使用人工智能助手,以及未来需要改进的地方。方法:在这项工作中,我们针对如何使用人工智能助手进行了大规模调查,重点关注特定的软件开发活动和阶段。我们收集了 481 名程序员对五大活动的意见:(a) 实现新功能,(b) 编写测试,(c) 错误分流,(d) 重构,(e) 编写自然语言工件,以及它们的各个阶段。结果:我们的结果对使用人工智能助手的不同阶段进行了新颖的比较,既全面又详细。它强调了开发人员认为不太愉快并希望委托给人工智能助手的特定活动,例如编写测试和自然语言工件。我们还确定了使用人工智能助手的更细化阶段,如生成测试和生成文档,以及工作流程中研究较少的部分,如生成测试数据。在不使用人工智能助手的原因中,有信任和公司政策等一般方面的原因,也有缺乏项目规模背景等更具体的问题,这些都是未来研究的重点。不使用人工智能助手的主要原因可作为今后工作的指南。
{"title":"Using AI-based coding assistants in practice: State of affairs, perceptions, and ways forward","authors":"Agnia Sergeyuk ,&nbsp;Yaroslav Golubev ,&nbsp;Timofey Bryksin ,&nbsp;Iftekhar Ahmed","doi":"10.1016/j.infsof.2024.107610","DOIUrl":"10.1016/j.infsof.2024.107610","url":null,"abstract":"<div><h3>Context:</h3><div>The last several years saw the emergence of <em>AI assistants</em> for code — multi-purpose AI-based helpers in software engineering. As they become omnipresent in all aspects of software development, it becomes critical to understand their usage patterns.</div></div><div><h3>Objective:</h3><div>We aim to better understand <em>how specifically</em> developers are using AI assistants, why they are <em>not</em> using them in certain parts of their development workflow, and what needs to be improved in the future.</div></div><div><h3>Methods:</h3><div>In this work, we carried out a large-scale survey aimed at how AI assistants are used, focusing on specific software development activities and stages. We collected opinions of 481 programmers on five broad activities: (a) implementing new features, (b) writing tests, (c) bug triaging, (d) refactoring, and (e) writing natural-language artifacts, as well as their individual stages.</div></div><div><h3>Results:</h3><div>Our results provide a novel comparison of different stages where AI assistants are used that is both comprehensive and detailed. It highlights specific activities that developers find less enjoyable and want to delegate to an AI assistant, <em>e.g.</em>, writing tests and natural-language artifacts. We also determine more granular stages where AI assistants are used, such as generating tests and generating docstrings, as well as less studied parts of the workflow, such as generating test data. Among the reasons for not using assistants, there are general aspects like trust and company policies, as well as more concrete issues like the lack of project-size context, which can be the focus of the future research.</div></div><div><h3>Conclusion:</h3><div>The provided analysis highlights stages of software development that developers want to delegate and that are already popular for using AI assistants, which can be a good focus for features aimed to help developers right now. The main reasons for not using AI assistants can serve as a guideline for future work.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107610"},"PeriodicalIF":3.8,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software aging oriented trustworthiness measurement based on weighted Boltzmann entropy 基于加权玻尔兹曼熵的面向软件老化的可信度测量
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1016/j.infsof.2024.107606
Hongwei Tao , Han Liu , Xiaoxu Niu , Licheng Ding , Yixiang Chen , Qiaoling Cao

Context:

With the rapid development of software, various software accidents emerge one after another. The catastrophic consequences caused by these accidents make people realize the importance of software trustworthiness. As an indispensable means to ensure software quality, traditional trustworthiness measurement evaluates the software trustworthiness by studying the trustworthy attributes in a static way. However, most of the factors considered in trustworthy attributes tend to be dynamic with time. The current research often ignores the changes in software after running for some time, and cannot reflect the changes in software trustworthiness at different running times.

Objective:

Our objective in this paper is to study the relationship between running time and software trustworthiness, and design a running time-related software trustworthiness measurement model from the untrustworthy evidence related to software aging.

Method:

We first extract the untrustworthy evidence from the bugs related to software aging in 5 subsystems of 4 public defect databases and 18 well-known software accidents, establish a risk level model, and design metric elements of untrustworthy evidence based on software aging. Then we construct a software aging cause category trustworthiness measurement model based on Boltzmann entropy. Finally, we build a software trustworthiness measurement model based on weighted Boltzmann entropy. For the weight values used in the model, the Brassard Priority Synthesis Analysis method was used to determine them.

Result:

Different from the common resource consumption parameter and performance parameter, a model based on weighted Boltzmann entropy can describe the influence of various parameters on the software’s trustworthiness through risk state. It can reflect the change of system state and describe the system state completely.

Conclusion:

The empirical study shows the effectiveness and practicality of our method for evaluating software dynamic trustworthiness. Meanwhile, it also indicates a promising avenue for future research and application in the field of software trustworthiness measurement.
背景:随着软件的快速发展,各种软件事故层出不穷。这些事故造成的灾难性后果让人们意识到软件可信度的重要性。作为保证软件质量不可或缺的手段,传统的可信度测评是通过研究静态的可信属性来评价软件的可信度。然而,可信属性中考虑的大多数因素往往是随时间变化的动态因素。本文旨在研究运行时间与软件可信度之间的关系,并从与软件老化相关的不可信证据中设计出与运行时间相关的软件可信度度量模型。方法:首先,我们从 4 个公共缺陷数据库的 5 个子系统中与软件老化相关的 bug 和 18 个知名软件事故中提取不可信证据,建立风险等级模型,并设计基于软件老化的不可信证据度量要素。然后,我们构建了基于玻尔兹曼熵的软件老化原因类别可信度度量模型。最后,我们建立了基于加权波尔兹曼熵的软件可信度度量模型。结果:与常见的资源消耗参数和性能参数不同,基于加权玻尔兹曼熵的模型可以通过风险状态来描述各种参数对软件可信度的影响。结论:实证研究表明,我们的软件动态可信度评估方法是有效和实用的。结论:实证研究表明了我们的软件动态可信度评估方法的有效性和实用性,同时也为今后软件可信度测量领域的研究和应用指明了方向。
{"title":"Software aging oriented trustworthiness measurement based on weighted Boltzmann entropy","authors":"Hongwei Tao ,&nbsp;Han Liu ,&nbsp;Xiaoxu Niu ,&nbsp;Licheng Ding ,&nbsp;Yixiang Chen ,&nbsp;Qiaoling Cao","doi":"10.1016/j.infsof.2024.107606","DOIUrl":"10.1016/j.infsof.2024.107606","url":null,"abstract":"<div><h3>Context:</h3><div>With the rapid development of software, various software accidents emerge one after another. The catastrophic consequences caused by these accidents make people realize the importance of software trustworthiness. As an indispensable means to ensure software quality, traditional trustworthiness measurement evaluates the software trustworthiness by studying the trustworthy attributes in a static way. However, most of the factors considered in trustworthy attributes tend to be dynamic with time. The current research often ignores the changes in software after running for some time, and cannot reflect the changes in software trustworthiness at different running times.</div></div><div><h3>Objective:</h3><div>Our objective in this paper is to study the relationship between running time and software trustworthiness, and design a running time-related software trustworthiness measurement model from the untrustworthy evidence related to software aging.</div></div><div><h3>Method:</h3><div>We first extract the untrustworthy evidence from the bugs related to software aging in 5 subsystems of 4 public defect databases and 18 well-known software accidents, establish a risk level model, and design metric elements of untrustworthy evidence based on software aging. Then we construct a software aging cause category trustworthiness measurement model based on Boltzmann entropy. Finally, we build a software trustworthiness measurement model based on weighted Boltzmann entropy. For the weight values used in the model, the Brassard Priority Synthesis Analysis method was used to determine them.</div></div><div><h3>Result:</h3><div>Different from the common resource consumption parameter and performance parameter, a model based on weighted Boltzmann entropy can describe the influence of various parameters on the software’s trustworthiness through risk state. It can reflect the change of system state and describe the system state completely.</div></div><div><h3>Conclusion:</h3><div>The empirical study shows the effectiveness and practicality of our method for evaluating software dynamic trustworthiness. Meanwhile, it also indicates a promising avenue for future research and application in the field of software trustworthiness measurement.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107606"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of minimum viable product on software ecosystem failure 最小可行产品对软件生态系统失败的影响
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-28 DOI: 10.1016/j.infsof.2024.107612
Kati Saarni , Marjo Kauppinen , Tomi Männistö

Context

Companies are interested in building successful value-producing ecosystems together to offer end users a broader digital service offering and better meet customer needs. However, most ecosystems fail in the early years.

Objective

We investigated one small software ecosystem from the planning phase to the operative phase, where the participating companies left one by one because the software ecosystem was unsuccessful, and the software ecosystem ended after four operative years. The software ecosystem provided a digital service offering based on the defined MVP (Minimum Viable Product). That is why we were interested in understanding the MVP's impact on the ecosystem's failure.

Method

We conducted a case study, the results of which are based on the semi-structured interviews of eight representatives of the software ecosystem.

Results

This study showed that the actors prioritized out functionalities from the MVP, and the MVP was no longer based on the defined value proposition, target customer groups, and customer paths. It was then difficult for the actors to achieve their objectives. The companies’ commitment depended on the set objectives, and when the objectives were not achieved, the actors left the ecosystem, and the software ecosystem failed.

Conclusion

The results show that the MVP can significantly affect the failure of the small software ecosystem, where all actors have a keystone role. The MVP largely defines what kind of digital service offering the software ecosystem provides and whether the actors can achieve the objectives, especially their sales goals. Thus, prioritizing the functionalities of the MVP is a critical activity.
背景各公司都希望共同建立一个成功的创造价值的生态系统,为最终用户提供更广泛的数字服务,更好地满足客户需求。我们对一个小型软件生态系统进行了调查,从规划阶段到运营阶段,参与的公司因为软件生态系统不成功而一个接一个地离开,软件生态系统在运营四年后结束。该软件生态系统根据定义的 MVP(最小可行产品)提供数字服务。这就是为什么我们有兴趣了解 MVP 对生态系统失败的影响。方法我们进行了一项案例研究,研究结果基于对软件生态系统八名代表的半结构化访谈。结果这项研究表明,参与者优先考虑了 MVP 中的功能,MVP 不再基于已定义的价值主张、目标客户群和客户路径。因此,参与者很难实现他们的目标。结果表明,MVP 对小型软件生态系统的失败有重大影响,在这个生态系统中,所有参与者都扮演着关键角色。MVP 在很大程度上决定了软件生态系统能提供什么样的数字服务,以及参与者能否实现目标,尤其是销售目标。因此,确定 MVP 功能的优先次序是一项至关重要的工作。
{"title":"Impact of minimum viable product on software ecosystem failure","authors":"Kati Saarni ,&nbsp;Marjo Kauppinen ,&nbsp;Tomi Männistö","doi":"10.1016/j.infsof.2024.107612","DOIUrl":"10.1016/j.infsof.2024.107612","url":null,"abstract":"<div><h3>Context</h3><div>Companies are interested in building successful value-producing ecosystems together to offer end users a broader digital service offering and better meet customer needs. However, most ecosystems fail in the early years.</div></div><div><h3>Objective</h3><div>We investigated one small software ecosystem from the planning phase to the operative phase, where the participating companies left one by one because the software ecosystem was unsuccessful, and the software ecosystem ended after four operative years. The software ecosystem provided a digital service offering based on the defined MVP (Minimum Viable Product). That is why we were interested in understanding the MVP's impact on the ecosystem's failure.</div></div><div><h3>Method</h3><div>We conducted a case study, the results of which are based on the semi-structured interviews of eight representatives of the software ecosystem.</div></div><div><h3>Results</h3><div>This study showed that the actors prioritized out functionalities from the MVP, and the MVP was no longer based on the defined value proposition, target customer groups, and customer paths. It was then difficult for the actors to achieve their objectives. The companies’ commitment depended on the set objectives, and when the objectives were not achieved, the actors left the ecosystem, and the software ecosystem failed.</div></div><div><h3>Conclusion</h3><div>The results show that the MVP can significantly affect the failure of the small software ecosystem, where all actors have a keystone role. The MVP largely defines what kind of digital service offering the software ecosystem provides and whether the actors can achieve the objectives, especially their sales goals. Thus, prioritizing the functionalities of the MVP is a critical activity.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107612"},"PeriodicalIF":3.8,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142572785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems 为可持续发展注入活力:EnSAF 用于可持续发展意识、软件密集型能源管理系统
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-26 DOI: 10.1016/j.infsof.2024.107607
Anjana M.S. , Patricia Lago , Aryadevi Remanidevi Devidas , Maneesha Vinodini Ramesh

Context:

India’s coal use for electricity jumped 13% in 2021–22. Energy management systems (EnMS) are seen as a solution, but only sustainable EnMS can have a discernable impact on the carbon footprint and the Return On Investment (ROI).

Objective:

Designing a software-intensive sustainable energy management system requires considering technical, environmental, social, and economic factors. This helps evaluate an EnMS’s overall impact and improve its design. We proposed EnSAF for efficient utilization of the energy incurred for the design of sustainability-aware EnMSs.

Method:

In this work, EnMSs in diverse use cases were selected and analyzed in terms of technical, social, environmental, and economic dimensions of sustainability in collaboration with various stakeholders. The set of application-specific design concerns and Quality Attributes (QAs) were addressed by the Sustainability Assessment Framework (SAF) toolkit. The resultant SAF instances of each EnMS, derived through the analysis and discussion with the stakeholders, were then analyzed to advocate the DMs and SQ model for generic EnMSs.

Results:

This study demonstrated the following outcomes (i) technical concerns dominate the existing EnMSs (ii) integration of renewable energy resources reduces dependency to the main power grid and nurtures a sustainable environment by diminishing carbon footprint, and minimizing payback time, in the economic dimension; (iii) extant definitions of quality attributes need significant scrutiny and updates apropos of objectives of EnMSs

Conclusion:

The SAF toolkit was found to be deficient in the representation of relevant design concerns and quality attributes concomitant with sustainable EnMS. Prevailing DMs are inept to factor in stakeholder’s concerns, as the model is ill-equipped to account for spatio-temporal representation of QAs. Pursuant to the insights from the 4 SAF instances, a generic framework, EnSAF, is proposed to tackle the relevant concerns apropos of EnMS sustainability. This work proposed a representation of DMs in the SAF toolkit specifically for sustainability-aware EnMS.
背景:2021-22 年,印度的煤炭用电量猛增 13%。目标:设计软件密集型可持续能源管理系统需要考虑技术、环境、社会和经济因素。这有助于评估能源管理系统的整体影响并改进其设计。方法:在这项工作中,我们与各利益相关方合作,从可持续发展的技术、社会、环境和经济维度选择并分析了不同用例中的 EnMS。可持续性评估框架(SAF)工具包解决了一系列特定应用的设计问题和质量属性(QA)。通过分析和与利益相关者的讨论,得出了每个 EnMS 的 SAF 实例,然后对其进行分析,以倡导通用 EnMS 的 DM 和 SQ 模型。结果:这项研究显示了以下结果:(i)技术问题在现有的 EnMS 中占主导地位;(ii)可再生能源资源的整合减少了对主电网的依赖,并通过减少碳足迹和最大限度地缩短投资回收期,在经济层面上培育了可持续发展的环境;(iii)现有的质量属性定义需要仔细审查,并根据 EnMS 的目标进行更新。现行的 DM 无法将利益相关者的关切考虑在内,因为该模型不具备考虑质量保证的时空表现的能力。根据从 4 个 SAF 案例中获得的启示,我们提出了一个通用框架 EnSAF,以解决与 EnMS 可持续性相关的问题。这项工作在 SAF 工具包中提出了一种 DMs 表示法,专门用于具有可持续性意识的 EnMS。
{"title":"Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems","authors":"Anjana M.S. ,&nbsp;Patricia Lago ,&nbsp;Aryadevi Remanidevi Devidas ,&nbsp;Maneesha Vinodini Ramesh","doi":"10.1016/j.infsof.2024.107607","DOIUrl":"10.1016/j.infsof.2024.107607","url":null,"abstract":"<div><h3>Context:</h3><div>India’s coal use for electricity jumped 13% in 2021–22. Energy management systems (EnMS) are seen as a solution, but only sustainable EnMS can have a discernable impact on the carbon footprint and the Return On Investment (ROI).</div></div><div><h3>Objective:</h3><div>Designing a software-intensive sustainable energy management system requires considering technical, environmental, social, and economic factors. This helps evaluate an EnMS’s overall impact and improve its design. We proposed EnSAF for efficient utilization of the energy incurred for the design of sustainability-aware EnMSs.</div></div><div><h3>Method:</h3><div>In this work, EnMSs in diverse use cases were selected and analyzed in terms of technical, social, environmental, and economic dimensions of sustainability in collaboration with various stakeholders. The set of application-specific design concerns and Quality Attributes (QAs) were addressed by the Sustainability Assessment Framework (SAF) toolkit. The resultant SAF instances of each EnMS, derived through the analysis and discussion with the stakeholders, were then analyzed to advocate the DMs and SQ model for generic EnMSs.</div></div><div><h3>Results:</h3><div>This study demonstrated the following outcomes (i) technical concerns dominate the existing EnMSs (ii) integration of renewable energy resources reduces dependency to the main power grid and nurtures a sustainable environment by diminishing carbon footprint, and minimizing payback time, in the economic dimension; (iii) extant definitions of quality attributes need significant scrutiny and updates apropos of objectives of EnMSs</div></div><div><h3>Conclusion:</h3><div>The SAF toolkit was found to be deficient in the representation of relevant design concerns and quality attributes concomitant with sustainable EnMS. Prevailing DMs are inept to factor in stakeholder’s concerns, as the model is ill-equipped to account for spatio-temporal representation of QAs. Pursuant to the insights from the 4 SAF instances, a generic framework, EnSAF, is proposed to tackle the relevant concerns apropos of EnMS sustainability. This work proposed a representation of DMs in the SAF toolkit specifically for sustainability-aware EnMS.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107607"},"PeriodicalIF":3.8,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FOBICS: Assessing project security level through a metrics framework that evaluates DevSecOps performance FOBICS:通过评估 DevSecOps 性能的度量框架来评估项目安全级别
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-21 DOI: 10.1016/j.infsof.2024.107605
Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo

Context:

In today’s software development landscape, the DevSecOps approach has gained traction due to its focus on the software development process and bolstering security measures in projects, a task in light of the ever-evolving cybersecurity threats.

Objective:

This study aims to address the lack of metrics for quantitatively assessing its efficacy from both security and business logic perspectives.

Methods:

To tackle this issue, the research introduces the Framework of Business Index Concerning Security (FOBICS), a set of metrics designed to enable transparent evaluations of project security. FOBICS considers various perspectives relevant to DevSecOps practices. It includes factors such as project duration and financial outcomes, making it appealing for implementation in business settings.

Results:

The effectiveness of FOBICS is validated theoretically and empirically via its application in two real-world projects: the results from these implementations show a correlation between FOBICS metrics and the security strategies employed as the development methodologies adopted by diverse teams throughout the projects.

Conclusion:

Hence, FOBICS emerges as a tool for assessing and continuously monitoring project security, offering insights into areas of strength and areas that may require enhancement. FOBICS is shown to be effective in assessing the level of DevSecOps implementation. The ease of calculating FOBICS metrics makes them easily interpretable and continuously verifiable. Moreover, FOBICS summarizes most of the other quantitative and qualitative metrics in the literature.
背景:在当今的软件开发领域,DevSecOps 方法因其专注于软件开发流程和加强项目中的安全措施而备受青睐,而这是在网络安全威胁不断发展的情况下的一项任务。方法:为解决这一问题,本研究引入了 "有关安全的业务指标框架"(FOBICS),这是一套旨在对项目安全性进行透明评估的指标。FOBICS 考虑了与 DevSecOps 实践相关的各种观点。结果:通过在两个实际项目中的应用,FOBICS 的有效性得到了理论和经验上的验证:这些实施的结果表明,FOBICS 指标与安全策略之间存在相关性,而安全策略是不同团队在整个项目中采用的开发方法。FOBICS 被证明能有效评估 DevSecOps 的实施水平。FOBICS 指标计算简便,易于解释和持续验证。此外,FOBICS 还总结了文献中的大多数其他定量和定性指标。
{"title":"FOBICS: Assessing project security level through a metrics framework that evaluates DevSecOps performance","authors":"Alessandro Caniglia,&nbsp;Vincenzo Dentamaro,&nbsp;Stefano Galantucci,&nbsp;Donato Impedovo","doi":"10.1016/j.infsof.2024.107605","DOIUrl":"10.1016/j.infsof.2024.107605","url":null,"abstract":"<div><h3>Context:</h3><div>In today’s software development landscape, the DevSecOps approach has gained traction due to its focus on the software development process and bolstering security measures in projects, a task in light of the ever-evolving cybersecurity threats.</div></div><div><h3>Objective:</h3><div>This study aims to address the lack of metrics for quantitatively assessing its efficacy from both security and business logic perspectives.</div></div><div><h3>Methods:</h3><div>To tackle this issue, the research introduces the Framework of Business Index Concerning Security (FOBICS), a set of metrics designed to enable transparent evaluations of project security. FOBICS considers various perspectives relevant to DevSecOps practices. It includes factors such as project duration and financial outcomes, making it appealing for implementation in business settings.</div></div><div><h3>Results:</h3><div>The effectiveness of FOBICS is validated theoretically and empirically via its application in two real-world projects: the results from these implementations show a correlation between FOBICS metrics and the security strategies employed as the development methodologies adopted by diverse teams throughout the projects.</div></div><div><h3>Conclusion:</h3><div>Hence, FOBICS emerges as a tool for assessing and continuously monitoring project security, offering insights into areas of strength and areas that may require enhancement. FOBICS is shown to be effective in assessing the level of DevSecOps implementation. The ease of calculating FOBICS metrics makes them easily interpretable and continuously verifiable. Moreover, FOBICS summarizes most of the other quantitative and qualitative metrics in the literature.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107605"},"PeriodicalIF":3.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Software Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1