

Success Factors during Requirements Implementation in Global Software Development: A Systematic Literature Review |
Pages: 56-68 (14) | [Full Text] PDF (492 KB) |
M Yaseen, Z Ali |
Engineering Research & IT Services Provider (Pvt) Ltd, Peshawar, Pakistan |
Abstract - Requirements implementation is difficult phase of software engineering. In Global Software Development (GSD), it becomes more difficult. There is need to address success factors during Requirement Engineering (RE) in context of GSD. Through Systematic Literature Review (SLR) success factors are identified and then analyzed in this research work. The identified factors are analyzed using different research methods such as case study, interview, questionnaire, surveys, and experiments. The identified factors are analyzed in different sub continents, software company size and period of time. The results of SLR will help vendors to better implement requirements. |
Index Terms - Global Software Development, Requirement Engineering, Systematic Literature Review |
C itation - M Yaseen, Z Ali. "Success Factors during Requirements Implementation in Global Software Development: A Systematic Literature Review." International Journal of Computer Science and Software Engineering 8, no. 3 (2019): 56-68. |
Enhancing the Trust of Users Based on Information Security Policy Compliance |
Pages: 69-71 (321 KB) | [Full Text] PDF (p2-V8I3.pdf) |
F Babtain, Z Halabi, A Karrar |
Faculty of Computer Science and Engineering, Taibah University, Madinah, Kingdom of Saudi Arabia |
Abstract - This paper provides a systematic literature review in the information security policies compliance (ISPC) field, with respect to information security culture, information security awareness, and information security management exploring in various settings the research designs, methodologies, and frame- works that have evolved over the last decade. Here, we characterize information security policy compliance for enhancing the trust of users. Data security strategy consistence is one of the key worries that face associations today.Despite the plenty of concentrates that endeavor to distinguish the variables that persuade consistence conduct or demoralize misuse and abuse practices, there is an absence of concentrates that explore the job of formal belief system in essence in clarifying consistence conduct. Here we profoundly characterize about Enhancing the Trust of Users about security strategy. |
Index Terms - Trust of Users Based, Enhancement, Information Security Policy |
C itation - F Babtain, Z Halabi, A Karrar. "Enhancing the Trust of Users Based on Information Security Policy Compliance." International Journal of Computer Science and Software Engineering 8, no. 3 (2019): 69-71. |
Awareness of Green Computing in Industries Sector |
Pages: 72-76 (5) | [Full Text] PDF (458 KB) |
H Rafae, MI Aslam, I Ahmed, MM Baig, F Alam |
Department of Telecommunication Engineering , NED University Karachi, Pakistan |
Abstract - Green Computing has gained various attentions due to rising of energy cost and increasing environmental effect. The aim objective of this paper is to generate the awareness of green computing among different district of industry sector. Green computing is the study and practice of using computer and related resources similar to monitors, printing, storage devices and communication systems in a friendly manner and also reduce energy consumption and minimal or no impact on the environment. Furthermore, most of the Computers is used 24/7 and more than 70% is not used for working instead used for other things. Due to this vast amount of energy is wasted. In this paper, we attempt to introduce the concept of green computing and the method to save energy and money in industries. |
Index Terms - Green Computing, Environmental, Energy, Consumption |
C itation - H Rafae, MI Aslam, I Ahmed, MM Baig, F Alam. "Awareness of Green Computing in Industries Sector." International Journal of Computer Science and Software Engineering 8, no. 3 (2019): 72-76. |