Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review

2011 ◽  
Vol 53 (7) ◽  
pp. 693-706 ◽  
Author(s):  
Siffat Ullah Khan ◽  
Mahmood Niazi ◽  
Rashid Ahmad
2018 ◽  
Vol 7 (3.20) ◽  
pp. 76
Author(s):  
Alawiyah Abd Wahab ◽  
Teh Piak San

Software development outsourcing has become a prevalent practice in the software industry. Organizations in both public and private sectors are adopting software development outsourcing in order to achieve lower cost and to access to skilled labour. However, it is widely recognized that outsourced software development projects involve risks and sometimes leads to undesirable consequences. Existing research in the software engineering and related areas have identified several risks in the software development outsourcing projects such as lack of communication and technical skills. The aim of this paper is to examine the literature on outsourced software development in order to identify some risks that could occur during the pre-contract, contract and post-contract phases of the outsourcing life cycle. It is anticipated that by understanding these risks, project managers could better manage them and subsequently increase the possibility of the success of outsourcing project. A systematic literature review of studies on software development outsourcing published in year 2005 to year 2015 was conducted. Of 41 studies consulted, 18 were concerned with outsourcing software development risk factors. The top three risk factors identified are lack of required technical skills and competencies (61%), lack of communication (44%) and poorly articulated requirements (44%).  


2021 ◽  
Vol 24 (1) ◽  
Author(s):  
Ignacio Velásquez

Authentication is the process of verifying a user’s identity for them to access a system’s resources. An authentication factor is a piece of information used for this authentication. Three well-known groups of authentication factors exist: knowledge-based (what you know), possession-based (what you have) and inherence-based (what you are). Authentication schemes belonging to distinct authentication factors can be combined in a multi-factor manner to increase security. Although multiple multi-factor proposals are seen in literature, the absence of a method that allows a proper comparison and selection of these authentication methods, based on an application’s security requirements, can be observed. Existing frameworks for the analysis of authentication methods have been identified through the realization of a systematic literature review, but most of these focus on specific contexts and do not provide a generic enough solution. Due to the above, this research focuses on the creation of a recommendation framework that guides in the comparison and selection of single and multi-factor authentication schemes, considering both the application’s requirements and its context. This has been attained not only through the knowledge found in literature, but the experience from industry experts has been compiled as well through the collaboration with a multinational software development company. Consequently, the knowledge found in literature has been obtained from a systematic literature review, whereas the experience from industry experts was obtained through a survey and interviews. The framework proposal has been generated based on the above and has been validated through an expert panel and a case study methodology in collaboration with the partnered software development company. A tool prototype has been constructed as well. The result is a recommendation framework for the comparison and selection of authentication methods that can support this decision process in multiple contexts.


Sign in / Sign up

Export Citation Format

Share Document