Global Software Development and Quality Management: A Systematic Review

Author(s):  
Deepti Mishra ◽  
Alok Mishra ◽  
Ricardo Colomo-Palacios ◽  
Cristina Casado-Lumbreras
2017 ◽  
Vol 14 (2) ◽  
pp. 393-421 ◽  
Author(s):  
Dilani Wickramaarachchi ◽  
Richard Lai

Global Software Development (GSD) is becoming increasingly prevalent, with software development teams being distributed around the world and working in collaboration with partner companies despite geographic and time differences. The main advantage of GSD which makes it attractive is the greater availability of human resources at lower costs. However, there are several disadvantages which are caused by the distance which separates the development teams. Coordination and communication become more difficult when the software development teams are located in different places, resulting in hidden costs involved in this process. As such, the effort estimation models used for collocated software development are inadequate for estimation in GSD. Thus, effort estimation in GSD is becoming an important area of research. Many researchers have focused on effort estimation in GSD over the last decade. This paper presents the findings of a systematic review of the related literature by summarizing the hidden costs in GSD, and discussing the open research issues in effort estimation in GSD.


Author(s):  
Sampada G.C ◽  
Tende Ivo Sake ◽  
Amrita

Background: With the advancement in the field of software development, software poses threats and risks to customers’ data and privacy. Most of these threats are persistent because security is mostly considered as a feature or a non-functional requirement, not taken into account during the software development life cycle (SDLC). Introduction: In order to evaluate the security performance of a software system, it is necessary to integrate the security metrics during the SDLC. The appropriate security metrics adopted for each phase of SDLC aids in defining the security goals and objectives of the software as well as quantify the security in the software. Methods: This paper presents systematic review and catalog of security metrics that can be adopted during the distinguishable phases of SDLC, security metrics for vulnerability and risk assessment reported in the literature for secure development of software. The practices of these metrics enable software security experts to improve the security characteristics of the software being developed. The critical analysis of security metrics of each phase and their comparison are also discussed. Results: Security metrics obtained during the development processes help to improve the confidentiality, integrity, and availability of software. Hence, it is imperative to consider security during the development of the software, which can be done with the use of software security metrics. Conclusion: This paper reviews the various security metrics that are meditated in the copious phases during the progression of the SDLC in order to provide researchers and practitioners with substantial knowledge for adaptation and further security assessment.


Sign in / Sign up

Export Citation Format

Share Document