Reducing Technical Debt: Using Persuasive Technology for Encouraging Software Developers to Document Code

Author(s):  
Yulia Shmerlin ◽  
Doron Kliger ◽  
Hayim Makabee
Author(s):  
Lamya Alkhariji ◽  
Nada Alhirabi ◽  
Mansour Naser Alraja ◽  
Mahmoud Barhamgi ◽  
Omer Rana ◽  
...  

Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions to learn how to incorporate different privacy-preserving ideas into their IoT application designs. This article lays the foundations toward developing such a privacy assistant by synthesising existing PbD knowledge to elicit requirements. It is believed that such a privacy assistant should not just prescribe a list of privacy-preserving ideas that developers should incorporate into their design. Instead, it should explain how each prescribed idea helps to protect privacy in a given application design context—this approach is defined as “Explainable Privacy.” A total of 74 privacy patterns were analysed and reviewed using ten different PbD schemes to understand how each privacy pattern is built and how each helps to ensure privacy. Due to page limitations, we have presented a detailed analysis in Reference [3]. In addition, different real-world Internet of Things (IoT) use-cases, including a healthcare application, were used to demonstrate how each privacy pattern could be applied to a given application design. By doing so, several knowledge engineering requirements were identified that need to be considered when developing a privacy assistant. It was also found that, when compared to other IoT application domains, privacy patterns can significantly benefit healthcare applications. In conclusion, this article identifies the research challenges that must be addressed if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase.


2015 ◽  
Vol 40 (2) ◽  
pp. 32-34 ◽  
Author(s):  
Carolyn Seaman ◽  
Robert L. Nord ◽  
Philippe Kruchten ◽  
Ipek Ozkaya
Keyword(s):  

2021 ◽  
Vol 26 (3) ◽  
Author(s):  
Rungroj Maipradit ◽  
Christoph Treude ◽  
Hideaki Hata ◽  
Kenichi Matsumoto
Keyword(s):  

A Correction to this paper has been published: 10.1007/s10664-021-09939-7


2021 ◽  
Vol 18 (2) ◽  
pp. 156-164 ◽  
Author(s):  
Catherine L. Lawson ◽  
Andriy Kryshtafovych ◽  
Paul D. Adams ◽  
Pavel V. Afonine ◽  
Matthew L. Baker ◽  
...  

AbstractThis paper describes outcomes of the 2019 Cryo-EM Model Challenge. The goals were to (1) assess the quality of models that can be produced from cryogenic electron microscopy (cryo-EM) maps using current modeling software, (2) evaluate reproducibility of modeling results from different software developers and users and (3) compare performance of current metrics used for model evaluation, particularly Fit-to-Map metrics, with focus on near-atomic resolution. Our findings demonstrate the relatively high accuracy and reproducibility of cryo-EM models derived by 13 participating teams from four benchmark maps, including three forming a resolution series (1.8 to 3.1 Å). The results permit specific recommendations to be made about validating near-atomic cryo-EM structures both in the context of individual experiments and structure data archives such as the Protein Data Bank. We recommend the adoption of multiple scoring parameters to provide full and objective annotation and assessment of the model, reflective of the observed cryo-EM map density.


2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Dimitrios Tsoukalas ◽  
Maria Mathioudaki ◽  
Miltiadis Siavvas ◽  
Dionysios Kehagias ◽  
Alexander Chatzigeorgiou

Sign in / Sign up

Export Citation Format

Share Document