Information and Software Technology最新文献

筛选
英文 中文
Mapping DevOps capabilities to the software life cycle: A systematic literature review 将 DevOps 能力映射到软件生命周期:系统性文献综述
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-19 DOI: 10.1016/j.infsof.2024.107583
Ricardo Amaro , Rúben Pereira , Miguel Mira da Silva
{"title":"Mapping DevOps capabilities to the software life cycle: A systematic literature review","authors":"Ricardo Amaro ,&nbsp;Rúben Pereira ,&nbsp;Miguel Mira da Silva","doi":"10.1016/j.infsof.2024.107583","DOIUrl":"10.1016/j.infsof.2024.107583","url":null,"abstract":"<div><h3>Context:</h3><p>Many IT organizations are looking towards DevOps to make their software development and delivery processes faster and more reliable, while DevOps revolutionized the industry by emphasizing collaboration between development and operations teams. Nonetheless, there still exist challenges in harmonizing cultural, technical, measurement and process capabilities for its successful adoption.</p></div><div><h3>Objective:</h3><p>To research improving DevOps adoption, this study explores DevOps Capabilities relevant to the Life Cycle Processes (LCPs) of the IEEE 2675-2021 DevOps standard. Aiming to provide valuable information on increasing efficiency and outcomes by mapping DevOps Capabilities in each phase of the LCPs. Whereas previous research identified and classified 37 DevOps Capabilities, this study aims to determine which capabilities can enhance each of the 30 phases of the LCPs.</p></div><div><h3>Methods:</h3><p>Out of 102 documents identified in the Systematic Literature Review (SLR), relations among DevOps Capabilities and LCPs have been synthesized and organized. An in-depth analysis of data was conducted over the connections across various categories. The mapping revealed how they relate in terms of their application and impact.</p></div><div><h3>Results:</h3><p>The SLR shows technical DevOps Capabilities and technical LCPs strongly correlated. DevOps measurement capabilities have a significant impact on agreement processes. Using an impact scale classification, the study identifies eight capabilities that have exceptional impact on LCPs and eleven capabilities that have a very high impact on the supply process, requirements definition, integration process, and validation process.</p></div><div><h3>Conclusion:</h3><p>The study demonstrates how DevOps Capabilities together with LCPs can improve software delivery, quality, and reliability. It presents a structured approach for improving processes, as well as evidence of DevOps integration in software development and maintenance. The findings help to assess DevOps Capabilities and LCP relations, which is expected to improve successful adoption. Future research should focus on researching practical cases of DevOps integration into LCPs, while overcoming adoption challenges.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107583"},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001885/pdfft?md5=0f638b8210f13166620dcfc6d3e2af01&pid=1-s2.0-S0950584924001885-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving DevOps team performance through context-capability coalignment: Towards a profile for public sector organizations 通过情境-能力联合提高 DevOps 团队绩效:为公共部门组织制定简介
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-18 DOI: 10.1016/j.infsof.2024.107585
Olivia H. Plant , Adina Aldea , Jos van Hillegersberg
{"title":"Improving DevOps team performance through context-capability coalignment: Towards a profile for public sector organizations","authors":"Olivia H. Plant ,&nbsp;Adina Aldea ,&nbsp;Jos van Hillegersberg","doi":"10.1016/j.infsof.2024.107585","DOIUrl":"10.1016/j.infsof.2024.107585","url":null,"abstract":"<div><h3>Context</h3><div>Many IT organizations turn to agile software delivery approaches such as DevOps in order to reduce the number of IT projects that are running behind schedule and above budget. However, the DevOps paradigm calls for an increased set of capabilities that need to be built and aligned with their context in order to ensure superior team performance.</div></div><div><h3>Objective</h3><div>This research aims to develop a context-capability coalignment profile for DevOps teams in public organizations. This profile and the corresponding design approach may serve as a model for other software production teams seeking to enhance their performance through improved coalignment. The resulting set of design principles places the traditional information systems theories of dynamic capabilities and contingency theory in a modern context.</div></div><div><h3>Method</h3><div>We adopt a longitudinal action design research approach centered around a DevOps team working in the IT department of a Dutch public organization. A mixed method design including scientific questionnaires, workshops, expert opinions and semi-structured interviews is employed to build and evaluate the profile.</div></div><div><h3>Results</h3><div>The resulting profile is characterized by technological complexity, a highly regulated environment, departmental interdependencies and high system relevance. The evaluation phase supports the validity of the artifact and suggests moderately improved coalignment of context and team capabilities after the research period, as well as a positive influence of coalignment on team performance.</div></div><div><h3>Conclusion</h3><div>It is contended that software teams in public organizations can benefit from improved coalignment between context and DevOps capabilities by following the presented approach. We argue that it is important to create a profile which is internally consistent and views coalignment as a continuous process in order to maximize the positive effect on team performance.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"178 ","pages":"Article 107585"},"PeriodicalIF":3.8,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeVAIC: A tool for security assessment of AI-generated code DeVAIC:人工智能生成代码的安全评估工具
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-16 DOI: 10.1016/j.infsof.2024.107572
Domenico Cotroneo, Roberta De Luca, Pietro Liguori
{"title":"DeVAIC: A tool for security assessment of AI-generated code","authors":"Domenico Cotroneo,&nbsp;Roberta De Luca,&nbsp;Pietro Liguori","doi":"10.1016/j.infsof.2024.107572","DOIUrl":"10.1016/j.infsof.2024.107572","url":null,"abstract":"<div><h3>Context:</h3><p>AI code generators are revolutionizing code writing and software development, but their training on large datasets, including potentially untrusted source code, raises security concerns. Furthermore, these generators can produce incomplete code snippets that are challenging to evaluate using current solutions.</p></div><div><h3>Objective:</h3><p>This research work introduces <em>DeVAIC</em> (Detection of Vulnerabilities in AI-generated Code), a tool to evaluate the security of AI-generated Python code, which overcomes the challenge of examining incomplete code.</p></div><div><h3>Methods:</h3><p>We followed a methodological approach that involved gathering vulnerable samples, extracting implementation patterns, and creating regular expressions to develop the proposed tool. The implementation of <em>DeVAIC</em> includes a set of detection rules based on regular expressions that cover 35 Common Weakness Enumerations (CWEs) falling under the OWASP Top 10 vulnerability categories.</p></div><div><h3>Results:</h3><p>We utilized four popular AI models to generate Python code, which we then used as a foundation to evaluate the effectiveness of our tool. <em>DeVAIC</em> demonstrated a statistically significant difference in its ability to detect security vulnerabilities compared to the state-of-the-art solutions, showing an <span><math><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> Score and Accuracy of 94% while maintaining a low computational cost of 0.14 s per code snippet, on average.</p></div><div><h3>Conclusions:</h3><p>The proposed tool provides a lightweight and efficient solution for vulnerability detection even on incomplete code.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107572"},"PeriodicalIF":3.8,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001770/pdfft?md5=4b13436df2c73b1417f75ea09a77256f&pid=1-s2.0-S0950584924001770-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142270421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual graph neural networks model using sequence embedding as graph nodes for vulnerability detection 利用序列嵌入作为图节点进行漏洞检测的双图神经网络模型
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-07 DOI: 10.1016/j.infsof.2024.107581
Miaogui Ling, Mingwei Tang, Deng Bian, Shixuan Lv, Qi Tang
{"title":"A dual graph neural networks model using sequence embedding as graph nodes for vulnerability detection","authors":"Miaogui Ling,&nbsp;Mingwei Tang,&nbsp;Deng Bian,&nbsp;Shixuan Lv,&nbsp;Qi Tang","doi":"10.1016/j.infsof.2024.107581","DOIUrl":"10.1016/j.infsof.2024.107581","url":null,"abstract":"<div><h3>Context:</h3><p>Detecting critical to ensure software system security. The traditional static vulnerability detection methods are limited by staff expertise and perform poorly with today’s increasingly complex software systems. Researchers have successfully applied the techniques used in NLP to vulnerability detection as deep learning has developed. The existing deep learning-based vulnerability detection models can be divided into sequence-based and graph-based categories. Sequence-based embedding models cannot use structured information embedded in the code, and graph-based embedding models lack effective node representations.</p></div><div><h3>Objective:</h3><p>To solve these problems, we propose a deep learning-based method, DGVD (Double Graph Neural Network for Vulnerability Detection).</p></div><div><h3>Methods:</h3><p>We use the sequential neural network approach to extract local semantic features of the code as nodes embedded in the control flow graph. First, we propose a dual graph neural network module (DualGNN) that consists of GCN and GAT. The altered module utilizes two different graph neural networks to obtain the global structural information of the control flow and the relationship between the nodes and fuses the two. Second, we propose a convolution-based feature enhancement module (TC-FE) that uses different convolution kernels of different sizes to capture information at different scales so that subsequent readout layers can better aggregate node information.</p></div><div><h3>Results:</h3><p>Experiments demonstrate that DGVD outperforms existing models, obtaining 64.23% vulnerability detection accuracy on CodeXGLUE’s real benchmark dataset.</p></div><div><h3>Conclusion:</h3><p>The proposed DGVD achieves better performance than the state-of-the-art DGVD has a more effective source code feature extraction capability on real-world datasets.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107581"},"PeriodicalIF":3.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001861/pdfft?md5=450f5d915db5cb174d591dea662c75cd&pid=1-s2.0-S0950584924001861-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing infrastructures to support mobile application testing: A systematic mapping study 支持移动应用程序测试的测试基础设施:系统制图研究
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-07 DOI: 10.1016/j.infsof.2024.107573
Pedro Henrique Kuroishi , Ana Cristina Ramada Paiva , José Carlos Maldonado , Auri Marcelo Rizzo Vincenzi
{"title":"Testing infrastructures to support mobile application testing: A systematic mapping study","authors":"Pedro Henrique Kuroishi ,&nbsp;Ana Cristina Ramada Paiva ,&nbsp;José Carlos Maldonado ,&nbsp;Auri Marcelo Rizzo Vincenzi","doi":"10.1016/j.infsof.2024.107573","DOIUrl":"10.1016/j.infsof.2024.107573","url":null,"abstract":"<div><h3>Context:</h3><p>Testing activities are essential for the quality assurance of mobile applications under development. Despite its importance, some studies show that testing is not widely applied in mobile applications. Some characteristics of mobile devices and a varied market of mobile devices with different operating system versions lead to a highly fragmented mobile ecosystem. Thus, researchers put some effort into proposing different solutions to optimize mobile application testing.</p></div><div><h3>Objective:</h3><p>The main goal of this paper is to provide a categorization and classification of existing testing infrastructures to support mobile application testing.</p></div><div><h3>Methods:</h3><p>To this aim, the study provides a Systematic Mapping Study of 27 existing primary studies.</p></div><div><h3>Results:</h3><p>We present a new classification and categorization of existing types of testing infrastructure, the types of supported devices and operating systems, whether the testing infrastructure is available for usage or experimentation, and supported testing types and applications.</p></div><div><h3>Conclusion:</h3><p>Our findings show a need for mobile testing infrastructures that support multiple phases of the testing process. Moreover, we showed a need for testing infrastructure for context-aware applications and support for both emulators and real devices. Finally, we pinpoint the need to make the research available to the community whenever possible.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107573"},"PeriodicalIF":3.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001782/pdfft?md5=f51e15c1c22c885eaa3b1068c8ec1e68&pid=1-s2.0-S0950584924001782-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specialized model initialization and architecture optimization for few-shot code search 针对少量代码搜索的专用模型初始化和架构优化
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-04 DOI: 10.1016/j.infsof.2024.107571
Fan Zhang , Qiang Wu , Manman Peng , Yuanyuan Shen
{"title":"Specialized model initialization and architecture optimization for few-shot code search","authors":"Fan Zhang ,&nbsp;Qiang Wu ,&nbsp;Manman Peng ,&nbsp;Yuanyuan Shen","doi":"10.1016/j.infsof.2024.107571","DOIUrl":"10.1016/j.infsof.2024.107571","url":null,"abstract":"<div><h3>Context:</h3><p>Code search aims to find relevant code snippets from a codebase given a natural language query. It not only boosts developer efficiency but also improves the performance of tasks such as code generation and program repair, thus becoming one of the crucial tasks in software engineering.</p></div><div><h3>Objective:</h3><p>However, recent works are mainly designed for mainstream programming languages with abundant training data. We aim to address the challenges of code search for domain-specific programming languages with limited training data by proposing a novel two-stage, few-shot code search framework named SMIAO.</p></div><div><h3>Method:</h3><p>SMIAO includes a specialized model initialization and an architecture optimization stage. In the first stage, we first quantitatively identify a mainstream programming language’s dataset that is semantically closest to a target few-shot programming language. Then, we enrich the dataset with hard samples and train an Adapter-GraphCodeBERT model to obtain well-initialized parameters. In the second stage, we first design a search space for the initialized Adapter-GraphCodeBERT model. Then, we employ neural architecture search to optimize the Adapter modules’ positions and quantities in the GraphCodeBERT layers, tailoring for real-world few-shot code search tasks.</p></div><div><h3>Results:</h3><p>We conduct experiments on a publicly available dataset to demonstrate the effectiveness and rationality of SMIAO. The experimental results show that SMIAO outperforms other state-of-the-art baselines.</p></div><div><h3>Conclusion:</h3><p>Using mainstream languages’ datasets to initialize Adapter-GraphCodeBERT models, followed by adjusting the quantities and positions of Adapter modules within the GraphCodeBERT layers by neural architecture search, can effectively improve the performance of few-shot code search tasks.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107571"},"PeriodicalIF":3.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001769/pdfft?md5=42c9abafebc31bfce0fe9d0923669722&pid=1-s2.0-S0950584924001769-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142161587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessibility of low-code approaches: A systematic literature review 低代码方法的可访问性:系统文献综述
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107570
Hourieh Khalajzadeh , John Grundy
{"title":"Accessibility of low-code approaches: A systematic literature review","authors":"Hourieh Khalajzadeh ,&nbsp;John Grundy","doi":"10.1016/j.infsof.2024.107570","DOIUrl":"10.1016/j.infsof.2024.107570","url":null,"abstract":"<div><h3>Context:</h3><p>Model-driven approaches are increasingly used in different domains, such as education, finance and app development, in order to involve non-developers in the software development process. Such tools are hugely dependent on visual elements and thus might not be accessible for users with specific challenges, <em>e.g.</em>, visual impairments.</p></div><div><h3>Objectives:</h3><p>To locate and analyse existing literature on the accessibility of low-code approaches, their strengths and weaknesses and key directions for future research.</p></div><div><h3>Methods:</h3><p>We carried out a systematic literature review and searched through five leading databases for primary studies. We used both quantitative and qualitative methods for data synthesis.</p></div><div><h3>Results:</h3><p>After reviewing and filtering 918 located studies, and conducting both backward and forward snowballing, we identified 38 primary studies that were included in our analysis. We found most papers focusing on accessibility of visual languages and block-based programming.</p></div><div><h3>Conclusion:</h3><p>Limited work has been done on improving low code programming environment accessibility. The findings of this systematic literature review will assist researchers and developers in understanding the accessibility issues in low-code approaches and what has been done so far to develop accessible approaches.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107570"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001757/pdfft?md5=0f1075cef5d4359991b8dedfbe12585f&pid=1-s2.0-S0950584924001757-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software solutions for newcomers’ onboarding in software projects: A systematic literature review 软件项目新人入职培训的软件解决方案:系统文献综述
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107568
Italo Santos , Katia Romero Felizardo , Igor Steinmacher , Marco A. Gerosa
{"title":"Software solutions for newcomers’ onboarding in software projects: A systematic literature review","authors":"Italo Santos ,&nbsp;Katia Romero Felizardo ,&nbsp;Igor Steinmacher ,&nbsp;Marco A. Gerosa","doi":"10.1016/j.infsof.2024.107568","DOIUrl":"10.1016/j.infsof.2024.107568","url":null,"abstract":"<div><h3>Context:</h3><p>Newcomers joining an unfamiliar software project face numerous barriers; therefore, effective onboarding is essential to help them engage with the team and develop the behaviors, attitudes, and skills needed to excel in their roles. However, onboarding can be a lengthy, costly, and error-prone process. Software solutions can help mitigate these barriers and streamline the process without overloading senior members.</p></div><div><h3>Objective:</h3><p>This study aims to identify the state-of-the-art software solutions for onboarding newcomers.</p></div><div><h3>Methods:</h3><p>We conducted a systematic literature review (SLR) to answer six research questions.</p></div><div><h3>Results:</h3><p>We analyzed 32 studies about software solutions for onboarding newcomers and yielded several key findings: (1) a range of strategies exists, with recommendation systems being the most prevalent; (2) most solutions are web-based; (3) solutions target a variety of onboarding aspects, with a focus on process; (4) many onboarding barriers remain unaddressed by existing solutions; (5) laboratory experiments are the most commonly used method for evaluating these solutions; and (6) diversity and inclusion aspects primarily address experience level.</p></div><div><h3>Conclusion:</h3><p>We shed light on current technological support and identify research opportunities to develop more inclusive software solutions for onboarding. These insights may also guide practitioners in refining existing platforms and onboarding programs to promote smoother integration of newcomers into software projects.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107568"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001733/pdfft?md5=5b1e509c801bc25d768d323c42cb734d&pid=1-s2.0-S0950584924001733-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic literature review on Agile, Cloud, and DevOps integration: Challenges, benefits 关于敏捷、云和 DevOps 整合的系统文献综述:挑战、益处
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-09-02 DOI: 10.1016/j.infsof.2024.107569
Fatiha El Aouni , Karima Moumane , Ali Idri , Mehdi Najib , Saeed Ullah Jan
{"title":"A systematic literature review on Agile, Cloud, and DevOps integration: Challenges, benefits","authors":"Fatiha El Aouni ,&nbsp;Karima Moumane ,&nbsp;Ali Idri ,&nbsp;Mehdi Najib ,&nbsp;Saeed Ullah Jan","doi":"10.1016/j.infsof.2024.107569","DOIUrl":"10.1016/j.infsof.2024.107569","url":null,"abstract":"<div><h3>Context:</h3><p>In today’s fast-paced digital landscape, integrating DevOps, cloud, and agile methodologies is crucial for meeting software demands. However, this integration remains under-researched.</p></div><div><h3>Objective:</h3><p>This study explores the integration of Agile, Cloud, and DevOps in today’s software development landscape. It aims to analyze the challenges and benefits associated with merging these three approaches, focusing on their impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.</p></div><div><h3>Methods:</h3><p>This investigation utilizes a Systematic Literature Review(SLR) to enrich comprehension of this integration in current software development practices.</p></div><div><h3>Results:</h3><p>The analysis of 31 articles highlights benefits such as improved collaboration and accelerated development, despite challenges with tool proliferation. Platforms like Jenkins, GitLab, Kubernetes, and Docker show promise in addressing these complexities. Our study examines the advantages and challenges of this integration, focusing on its impact on software testing and the role of mindset in successful implementation and identifying the most suitable Agile methodologies.</p></div><div><h3>Conclusion:</h3><p>The integration of Agile, DevOps, and Cloud signifies a vital move towards collaborative, scalable, and automated methods, crucial for swift delivery, enhanced quality, and ongoing competitiveness. This unified approach is fundamental for organizational advancement and innovation in the ever-evolving software development realm. Further research should tackle challenges in merging these methods and delve into their interactions with emerging technologies to refine practices for increased efficiency.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107569"},"PeriodicalIF":3.8,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0950584924001745/pdfft?md5=e228bb6a5ecf5b26efe28bc3feb2aedb&pid=1-s2.0-S0950584924001745-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142128306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based explainable vulnerability prediction 基于图形的可解释漏洞预测
IF 3.8 2区 计算机科学
Information and Software Technology Pub Date : 2024-08-31 DOI: 10.1016/j.infsof.2024.107566
Hong Quy Nguyen , Thong Hoang , Hoa Khanh Dam , Aditya Ghose
{"title":"Graph-based explainable vulnerability prediction","authors":"Hong Quy Nguyen ,&nbsp;Thong Hoang ,&nbsp;Hoa Khanh Dam ,&nbsp;Aditya Ghose","doi":"10.1016/j.infsof.2024.107566","DOIUrl":"10.1016/j.infsof.2024.107566","url":null,"abstract":"<div><p>Significant increases in cyberattacks worldwide have threatened the security of organizations, businesses, and individuals. Cyberattacks exploit vulnerabilities in software systems. Recent work has leveraged powerful and complex models, such as deep neural networks, to improve the predictive performance of vulnerability detection models. However, these models are often regarded as “black box” models, making it challenging for software practitioners to understand and interpret their predictions. This lack of explainability has resulted in a reluctance to adopt or deploy these vulnerability prediction models in industry applications. This paper proposes a novel approach, <strong>G</strong>enetic <strong>A</strong>lgorithm-based <strong>Vul</strong>nerability Prediction <strong>Explainer</strong>, (herein GAVulExplainer), which generates explanations for vulnerability prediction models based on graph neural networks. GAVulExplainer leverages genetic algorithms to construct a subgraph explanation that represents the crucial factor contributing to the vulnerability. Experimental results show that our proposed approach outperforms baselines in providing concrete reasons for a vulnerability prediction.</p></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"177 ","pages":"Article 107566"},"PeriodicalIF":3.8,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S095058492400171X/pdfft?md5=51c2432186d2a7513da1bb84a4daf260&pid=1-s2.0-S095058492400171X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信