scholarly journals Comparative analysis on different software piracy prevention techniques

Author(s):  
Ahmad Mohammad Hassan ◽  
Ayuba John

Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.

2008 ◽  
pp. 147-176
Author(s):  
Dariusz Libionka

This article is an attempt at a critical analysis of the history of the Jewish Fighting Union (JFU) and a presentation of their authors based on documents kept in the archives of the Institute of National Remembrance in Warsaw. The author believes that an uncritical approach and such a treatment of these materials, which were generated under the communist regime and used for political purposes resulted in a perverted and lasting picture of the history of this fighting organisation of Zionists-revisionists both in Poland and Israel. The author has focused on a deconsturction of the most important and best known “testimonies regarding the Warsaw Ghetto Uprising”, the development and JFU participation in this struggle, given by Henryk Iwaƒski, WΠadysΠaw Zajdler, Tadeusz Bednarczyk and Janusz Ketling–Szemley.A comparative analysis of these materials, supplemented by important details of their war-time and postwar biographies, leaves no doubt as to the fact that they should not be analysed in terms of their historical credibility and leads one to conclude that a profound revision of research approach to JFU history is necessary.


2021 ◽  
Vol 181 ◽  
pp. 827-834
Author(s):  
Luís M. Alves ◽  
Gustavo Souza ◽  
Pedro Ribeiro ◽  
Ricardo J. Machado

Author(s):  
Vinod Vijayakumaran ◽  
G. Radhamani ◽  
P. Ranjit Jeba Thangaiah

The delivery process of any IT organization depends on the effective software development methodologies. Along with conventional software development methodologies, corporates are also found to adopt various quality standards in order to enhance their development methodologies. Although there were substantial researches work carried out in past, majority of the study discusses about the theoretical implementation of quality standards. Due to various intermittent impediments, e.g., requirement volatility, skill gap, schedule slippage, etc., the standard quality models are very often violated in real time environment leading to degradation in development methodologies. Hence, this manuscript discusses an integrated framework using Scrum, Lean Six Sigma, and Agile which has been formulated on the basis on existing flaws in software development methodologies and propose some of the potential features to enhance it.


2021 ◽  
Vol 39 (39) ◽  
pp. 54-69
Author(s):  
Vanya Banabakova

Logistics continuously expands its application areas. In modern conditions, there is a need to apply logistics in areas not related to its traditional applications such as military and business spheres, resulting in the identification of a third area with the name social logistics. Social logistics aims to introduce a social (human) factor into the systems and to apply logistic principles and methods in solving the problems of society. Social logistics can be defined as a set of actions that ensure the effective functioning of social systems (such as a set of social phenomena, processes and subjects), applying the principles of logistics. For the purposes of this paper, a number of scientific approaches and methods have been applied, such as system approach, comparative analysis, critical analysis, synthesis and others. Social logistics plays an important role in national security, including economic and social security. The purpose of this paper is to explore the role of social logistics in enhancing national security, including economic and social security.


2021 ◽  
Vol 28 (1) ◽  
Author(s):  
M.A. Adeagbo ◽  
J.E.T. Akinsola ◽  
A.A. Awoseyi ◽  
F. Kasali

Selection of a suitable Software Development Life Cycle (SDLC) model for project implementation is somewhat confusing as there are a lot of SDLC models with similar strengths and weaknesses. Also, the solutions proffered among the researchers so far have been the  qualitative comparative analysis of SDLC models. Hence, this paper proposes a comparative analysis of SDLC models using quantitative approach in relation to strengths and weaknesses of SDLC models. The study adapted comparative analysis and Software Development Life Cycle (SDLC) models features’ classification using ten characteristics such as project complexity, project size, project duration, project with risk, implementation/initial cost, error discovery, associated cost, risk analysis, maintenance and cost estimation. A quantitative measure that employs online survey using experts in software design and engineering, project management and system analysis was carried out for the evaluation of SDLC models. Purposeful Stratified Random Sampling (SRS) technique was used to gather the data for analysis using XLSTAT after pre-processing, taking into consideration both benefit and cost criteria. The overall performance evaluation showed that Spiral-Model is the best followed by V-Model and lastly Waterfall Model with comparative values of 38.63%, 35.76% and 25.61% respectively. As regards cost estimation, Waterfall Model is the most efficient with value of 41%, then V-Model with 31% and lastly Spiral Model with 28%. V-Model has great error recovery capability with value of 45% which is closely followed by Spiral Model with 37% and lastly Waterfall Model with 18%. The study revealed that, a model with efficient risk assurance does not guarantee efficient cost management. In the future work, more characteristics regarding SDLC models shall be considered.


Author(s):  
Mariana Peixoto ◽  
Carla Silva ◽  
Ricarth Lima ◽  
João Araújo ◽  
Tony Gorschek ◽  
...  

Recent research has pointed out that software developers face difficulties to specify requirements for privacy-sensitive systems. To help addressing this issue, this paper presents a tool, called PCM Tool, that supports the Privacy Criteria Method (PCM) - an approach designed to guide the specification of privacy requirements in agile software development.


Author(s):  
Sebastian Baltes

AbstractAnalyzing and understanding software developers’ work habits and resulting needs is an essential prerequisite to improve software development practice. In our research, we utilize different qualitative and quantitative research methods to empirically investigate three underexplored aspects of software development: First, we analyze how software developers use sketches and diagrams in their daily work and derive requirements for better tool support. Then, we explore to what degree developers copy code from the popular online platform Stack Overflow without adhering to license requirements and motivate why this behavior may lead to legal issues for affected open source software projects. Finally, we describe a novel theory of software development expertise and identify factors fostering or hindering the formation of such expertise. Besides, we report on methodological implications of our research and present the open dataset SOTorrent, which supports researchers in analyzing the origin, evolution, and usage of content on Stack Overflow. The common goal for all studies we conducted was to better understand software developers’ work practices. Our findings support researchers and practitioners in making data-informed decisions when developing new tools or improving processes related to either the specific work habits we studied or expertise development in general.


Sign in / Sign up

Export Citation Format

Share Document