Search results for "development method"

showing 7 items of 7 documents

State of the Art in Information Security Policy Development

2020

Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…

General Computer ScienceComputer scienceliterature reviewmedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologyOutcome (game theory)information security policyconcept definitionState (polity)development method0202 electrical engineering electronic engineering information engineeringtietoturvaFunction (engineering)media_commonComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpolicy developmenttietoturvapolitiikka020206 networking & telecommunicationsSubject (documents)kehittäminenInformation securityData scienceTerm (time)Information security policy020201 artificial intelligence & image processingLawkäsiteanalyysi
researchProduct

Quality culture boosts agile transformation : Action research in a business‐to‐business software business

2023

Agile methodologies are sometimes adopted, with the assumption that benefits can be attained by only using a set of best practices, which can sometimes work to a degree. In this paper, a case is discussed where a software-producing organization of seven teams achieved significant improvements. The goal of the research was to answer two questions: how an already agile organization could improve its performance further and what is the impact of promoting quality aspects? The questions were answered by implementing interventions based on prior literature and data emerging from semi-structured interviews. The context was an established business with a complex revenue stream structure, meaning t…

revenue streamhybrid development methodsmixedbusiness modeltoimintatutkimuskehittäminenB2Bteam coordinationyrityksetketterät menetelmätqualityscaled agileliiketoimintaempiirinen tutkimusohjelmistoliiketoimintaagile adoptionincrement planning eventempirical
researchProduct

Review of the methods for the development of information security policies at organizations

2016

This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of information security policy and other relevant issues in information security policy development within organizations. There are four research questions are proposed based on this topic: 1) what are the functions of information security policy; 2) what kind of stakeholders should be involved in the development of information security policy; 3) what is the information security policy lifecycle; 4) what are the methods in development of information security policy. The research…

functions of information security policyinformation security policydevelopment lifecycletietoturvapolitiikkakehittäminentietoturvaelinkaariyrityksetdevelopment methodsstakeholders of information security policy
researchProduct

Essence : Reference Architecture for Software Engineering - Representing Essence in Archimate Notation

2018

Essence is a standard for working with methods in software engineering. As such, it can be seen as the reference architecture for software engineering. The Essence consists of the Kernel, and a notation called the Language. This representation is not widely known and likely hinders the adoption of the Essence. This paper represents the work-in-progress of representing the Essence using ArchiMate, the de facto notation for enterprise architecture. Our purpose is to help organisations to adopt Essence by representing it in the language already understood by different stakeholders. peerReviewed

ta113software development methodbusiness.industryComputer scienceSEMAT020206 networking & telecommunications020207 software engineering02 engineering and technologyNotationessenceArchiMatekernel0202 electrical engineering electronic engineering information engineeringReference architectureSoftware engineeringbusinessohjelmistokehitys
researchProduct

Enhancing Creativity: Using Visual Mnemonic Devices in the Teaching Process in Order to Develop Creativity in Students

2020

(1) Background: In the field of creativity studies there is always space for expansion and new conceptualizations of the methods involved. Therefore, we will present in this paper a brief arrangement of the methods used to enhance creativity and consider whether visual mnemonic devices can increase creativity. The devices are used in the teaching process in order to ease the remembering process by creating a visual representation. Visual mnemonic devices are techniques that increase creativity as part of their own performance. (2) Methods: We will use a quasi-experimental, nonequivalent group design, the procedure involving the use of visual mnemonic devices. (3) Results: The results show t…

Computer scienceProcess (engineering)media_common.quotation_subjectGeography Planning and DevelopmentTJ807-830MnemonicManagement Monitoring Policy and LawSpace (commercial competition)TD194-195Renewable energy sourcesField (computer science)Fluency0502 economics and businessGE1-350Representation (mathematics)creativity development methodscreativitymedia_commonEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environment05 social sciences050301 educationCreativityEnvironmental sciencesOrder (business)visual mnemonic devices0503 education050203 business & managementCognitive psychologySustainability
researchProduct

Developing Organization-Specific Information Security Policies by using Critical Thinking

2018

information security policytoimintatutkimustietoturvapolitiikkaorganisaatiottietoturvadevelopment methods
researchProduct

Investigating the causal mechanisms underlying the customization of software development methods

2017

Over the last four decades, software development has been one of the mainstream topics in the Software Engineering and Information Systems disciplines. Thousands of methods have been put forward offering prescriptions for software development processes. The goal of these methods is to produce high-quality software in a systematic manner. However, it is widely known that these methods are rarely followed as prescribed – developers often modify or skip different steps, practices, or quality rules recommended by software development methods. While a group of previous studies suggests that maximizing the flexibility and leanness of software development processes is the key driver of such custom…

Prosessiteoriatekninen velkaKirjallisuuskatsauksetohjelmistokehittäjätohjelmistotuotantosystematic literature reviewlaatubalancinginformation systems developmentGrounded theorytyötavatmenetelmättyömenetelmättechnical debtprocess theoryräätälöintisoftware development methodsbehavioral software engineeringohjelmistokehitysvaatimukset
researchProduct