Cyber security threats and vulnerabilities: a systematic map** study

M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb… - Arabian Journal for …, 2020 - Springer
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …

A method for evaluating rigor and industrial relevance of technology evaluations

M Ivarsson, T Gorschek - Empirical Software Engineering, 2011 - Springer
One of the main goals of an applied research field such as software engineering is the
transfer and widespread use of research results in industry. To impact industry, researchers …

A systematic literature review to identify and classify software requirement errors

GS Walia, JC Carver - Information and Software Technology, 2009 - Elsevier
Most software quality research has focused on identifying faults (ie, information is incorrectly
recorded in an artifact). Because software still exhibits incorrect behavior, a different …

The adoption of software-as-a-service (SaaS): ranking the determinants

F Safari, N Safari, A Hasanzadeh - Journal of Enterprise Information …, 2015 - emerald.com
Purpose–Software-as-a-Service (SaaS) has the potential to provide substantial
opportunities for organizations to improve their information technology without cost and …

Digital forensic readiness: Expert perspectives on a theoretical framework

M Elyas, A Ahmad, SB Maynard, A Lonie - Computers & Security, 2015 - Elsevier
Modern organizations need to develop 'digital forensic readiness' to comply with their legal,
contractual, regulatory, security and operational obligations. A review of academic and …

MEEGA+: Um Modelo para a Avaliação de Jogos Educacionais para o ensino de Computação

G Petri, CG von Wangenheim… - Revista Brasileira de …, 2019 - milanesa.ime.usp.br
Jogos educacionais estão sendo usados como uma estratégia instrucional inovadora para
o ensino e aprendizagem em diversas áreas de conhecimento. No entanto, é essencial …

A method for the evaluation of the quality of games for computing education

G Petri - 2018 - repositorio.ufsc.br
Educational games are supposed to be an effective and efficient instructional strategy for
teaching and learning in diverse knowledge areas, including computing. Especially in …

Towards implementation of requirements management specific practices (SP1. 3 and SP1. 4) for Saudi Arabian small and medium sized software development …

I Keshta, M Niazi, M Alshayeb - IEEE Access, 2017 - ieeexplore.ieee.org
There is a significant need to give careful consideration to Capability Maturity Model
Integration (CMMI) Level 2 specific practices-SP 1.3 “manage requirements changes,” and …

MMALA: Develo** and evaluating a Maturity Model for Adopting Learning Analytics

E Freitas, F Fonseca, V Garcia… - Journal of Learning …, 2024 - learning-analytics.info
Learning analytics (LA) adoption is a challenging task for higher education institutions
(HEIs) since it involves different aspects of the academic environment, such as information …

[PDF][PDF] Systematic literature review of software process capability/maturity models

CG von Wangenheim, JCR Hauck… - … on Software Process …, 2010 - academia.edu
Software process improvement and assessment guided by a maturity level or a process
capability profile based on a capability/maturity model is now well established in practice as …