Search Results

Now showing 1 - 4 of 4
  • Conference Object
    Citation - Scopus: 2
    Big Data on Cloud for Government Agencies: Benefits, Challenges, and Solutions
    (Assoc Computing Machinery, 2018) Rashed, Alaa Hussain; Karakaya, Ziya; Yazici, Ali
    Big Data and Cloud computing are the most important technologies that give the opportunity for government agencies to gain a competitive advantage and improve their organizations. On one hand, Big Data implementation requires investing a significant amount of money in hardware, software, and workforce. On the other hand, Cloud Computing offers an unlimited, scalable and on-demand pool of resources which provide the ability to adopt Big Data technology without wasting on the financial resources of the organization and make the implementation of Big Data faster and easier. The aim of this study is to conduct a systematic literature review in order to collect data to identify the benefits and challenges of Big Data on Cloud for government agencies and to make a clear understanding of how combining Big Data and Cloud Computing help to overcome some of these challenges. The last objective of this study is to identify the solutions for related challenges of Big Data. Four research questions were designed to determine the information that is related to the objectives of this study. Data is collected using literature review method and the results are deduced from there.
  • Review
    Citation - WoS: 152
    Citation - Scopus: 194
    Challenges and Best Practices in Industry-Academia Collaborations in Software Engineering: a Systematic Literature Review
    (Elsevier, 2016) Garousi, Vahid; Petersen, Kai; Ozkan, Baris
    Context: The global software industry and the software engineering (SE) academia are two large communities. However, unfortunately, the level of joint industry-academia collaborations in SE is still relatively very low, compared to the amount of activity in each of the two communities. It seems that the two 'camps' show only limited interest/motivation to collaborate with one other. Many researchers and practitioners have written about the challenges, success patterns (what to do, i.e., how to collaborate) and anti-patterns (what not do do) for industry-academia collaborations. Objective: To identify (a) the challenges to avoid risks to the collaboration by being aware of the challenges, (b) the best practices to provide an inventory of practices (patterns) allowing for an informed choice of practices to use when planning and conducting collaborative projects. Method: A systematic review has been conducted. Synthesis has been done using grounded-theory based coding procedures. Results: Through thematic analysis we identified 10 challenge themes and 17 best practice themes. A key outcome was the inventory of best practices, the most common ones recommended in different contexts were to hold regular workshops and seminars with industry, assure continuous learning from industry and academic sides, ensure management engagement, the need for a champion, basing research on real world problems, showing explicit benefits to the industry partner, be agile during the collaboration, and the co-location of the researcher on the industry side. Conclusion: Given the importance of industry-academia collaboration to conduct research of high practical relevance we provide a synthesis of challenges and best practices, which can be used by researchers and practitioners to make informed decisions on how to structure their collaborations. (C) 2016 Elsevier B.V. All rights reserved.
  • Conference Object
    An Overview of Challenges To Long-Term Sustainability and Scalability of Radio Frequency Fingerprinting
    (IEEE, 2024) Demiroglu, Harun Senol; Awan, Maaz Ali; Kara, Ali
    Internet of Things (IoT) technology has become ubiquitous with a broad spectrum of applications. This vast penetration entails formidable cyber-security for the stable operation of the associated systems. Most inexpensive IoT devices employ rudimentary cryptographic security mechanisms due to their resource-limited architecture. Radio frequency fingerprinting (RFF) is a physical layer security mechanism that leverages hardware impairments for authentication and device classification. To this end, its scope has been limited to academia owing to daunting challenges. In this work, an abridged overview of the state-of-the-art is provided, along with a summary of the challenges that hinder progress toward practical applications. The article culminates with a discussion on the intricacies of performance metrics in RFF and the direction for future research.
  • Article
    Citation - WoS: 8
    Citation - Scopus: 12
    Srcmimm: the Software Requirements Change Management and Implementation Maturity Model in the Domain of Global Software Development Industry
    (Springer, 2023) Akbar, Muhammad Azeem; Khan, Arif Ali; Mahmood, Sajjad; Mishra, Alok
    The software industry has widely adopted global software development (GSD) to gain economic benefits. Organizations that engage in GSD face various challenges, the majority being associated with requirements change management (RCM). The key motive of this study is to develop a requirement change management and implementation maturity model (SRCMIMM) for the GSD industry that could help the practitioners to assess and manage their RCM activities. A systematic literature review and questionnaire survey approach are used to identify and validate the critical success factors (CSFs), critical challenges (CCHs), and the related best practices of the RCM process. The investigated CSFs and CCHs are classified into five maturity levels based on the concepts of the existing maturity models in other domains, practitioners' feedback, and academic research. Every maturity level comprises different CSFs and CCHs that can help assess and manage a firm's RCM capability. To evaluate the effectiveness of the proposed model, four case studies are conducted in different GSD firms. The SRCMIMM has been developed to assist GSD organizations in improving their RCM process in efficiency and effectiveness.