The document discusses software risk factors in developing e-governance projects in India. It identifies several risks: unclear project definitions, inaccurate requirements documentation, inefficient design models, inconsistencies in data flow, and language barriers. E-governance projects require huge investments, so risks must be carefully evaluated during feasibility studies. Risks can impact reliability and maintenance efforts. To minimize risks, quality documentation is important throughout the project life cycle, and both technical and non-technical perspectives must be considered.
Operational technology threats in developing countries and possible solutionFaysal Ghauri
My first paper on Cybersecurity, especially to Operational Technology and the challenges in developing countries although I have found similar challenges in the developed countries as well. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.
Operational technology threats in developing countries and possible solutionFaysal Ghauri
My first paper on Cybersecurity, especially to Operational Technology and the challenges in developing countries although I have found similar challenges in the developed countries as well. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
An analysis of security trends in the Financial Services industry. 56% of attacks originate from IP addresses within the US but attackers could be anywhere in the world.
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, organizations should be aware of social engineering defense mechanisms and security policies. To that end, the authors developed a taxonomy of social engineering defense mechanisms, designed a survey to measure employee awareness of these mechanisms, proposed a model of Social Engineering InfoSec Policies (SE-IPs), and designed a survey to measure the incorporation level of these SE-IPs. After analyzing the data from the first survey, the authors found that more than half of employees are not aware of social engineering attacks. The paper also analyzed a second set of survey data, which found that on average, organizations incorporated just over fifty percent of the identified formal SE-IPs. Such worrisome results show that organizations are vulnerable to social engineering attacks, and serious steps need to be taken to elevate awareness against these emerging security threats.
Gallatin Heritage Consortium Event Brochure, Summmer 2015.
Through collaboration among local groups, the Gallatin Heritage Consortium engages the public in our local history through unified programs, professional development, shared resources, and communication.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development. However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTijcsit
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development.
However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process
Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development.However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes
problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p≤ 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p≤ 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.
Gallatin Heritage Consortium Event Brochure, Summmer 2015.
Through collaboration among local groups, the Gallatin Heritage Consortium engages the public in our local history through unified programs, professional development, shared resources, and communication.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development. However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
A PROCESS QUALITY IMPROVEMENT MECHANISM FOR REDUCING THE RISK OF CI ENVIRONMENTijcsit
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development.
However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process
Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
In the age of fast evolution, software development project must accept many challenges of unpredicted requirements change and new technology environment. Software development processes should have adjustable and extendable features to meet the multifaceted needs of the users. Iterative and Incremental Development (IID) is a practical approach to overcome the various challenges of software development.However, continuous testing and building new versions need to spend more time and human resources that is a major obstacle of IID. The other, the iterative operations must have a sound communication skills. Lack of standard version control and intercommunication manner often lead to failure of software project. High quality Continuous Integration (CI) environment can effectively make up the defects of IID. In this paper, CI environment and advantages are deeply surveyed. In order to overcome the defects of IID, CI environment needs combine the perfect procedures and qualified tools, and concretely enhance the quality of CI environment. Based on the process quality measurement model, this paper proposes the Process Quality Improvement Mechanism (PQIM). Applying PQIM, in software development, the processes
problems and the CI environment quality defects can identify timely and indeed revise to reduce the risk of CI environment.
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p≤ 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p≤ 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.
Mobile App Part 1.15Project summaryProject requirements.docxannandleola
Mobile App Part 1. 15
Project summary
Project requirements
This project will have several requirements for its development.
Functional requirements
A user should be able to use the mobile application to be developed.
Each user using the mobile application should be uniquely identified using the registration details.
The system should have a wide scope across several mobile operating system platforms.
Non-functional requirements
i. Ease of use
The mobile application should be easy to use by all users
ii. Reliability
The mobile application should have minimum rate of failure
iii. Portability
The mobile application should operate in various and be integrated in various platforms.
iv. Security
Any user data sent, should be encrypted
v. Size.
The mobile application should occupy less server and mobile space.Budget
Desktop
$250
Smartphone
$400
Transport
$60
Flash Drive 2GB
$20
Printer
$80
Internet subscription
$50
SMS gateway subscription
$60
Miscellaneous
$80
Total
$1000
Human resources
Three programmers
One database developer
Workload
Person
Task
All programmers
Analysis, design
Two programmers
coding
One programmer
Testing and debugging
Database developer
Design and develop database
Work breakdown structure is a hierarchical and an incremental decomposition of a given project into deliverables, phases and work packages. It is a tree structure, which shows a subdivision of effort required to achieve an objective.
The methodology behind the construction of WBS is the system analysis, system design, and system development. The WBS helps in analyzing the system and the project.
References
Haugan, G. T. (2002). Effective work breakdown structures. Vienna, Va: Management Concepts.
Harris, P. E. (2007). Planning and control using Microsoft Project and PMBOK® guide: Updated for Microsoft Office Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd.
Harris, P. E. (1999). Planning and control using Microsoft® Project 2010 and PMBOK guide® fourth edition. Victoria, Australia: Eastwood Harris.
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work breakdown structures: The foundation for project management excellence. Hoboken, N.J: John Wiley & Sons.
Comparison between the Gantt chart and PERT
PERT (program evaluation and review technique) is one of the statistical tool that is used in project management to analyze and represent the tasks involved in the completion of a given project while a Gantt chart is a horizontal tabular bar chart which shows the project schedule that is it shows the start and finish dates of the terminal elements of the project and summary elements of a project.
The Gantt chart may be used in status reporting to show and present how much of the plan has been completed by displaying and showing the progress of an activity.
The information received from a Gantt chart is more helpful because, the information in a Gantt chart is graphical hence easily understood than in the PERT which just show ...
Most severe risk factors in software development projects in Kuwaitnooriasukmaningtyas
Software development projects are famous of high rate failure, this made an
encouragement for researcher to investigate reasons of failure. However,
literature covering under developed countries is uncommon. This research
investigates the most severe risk factors in software development project in
the country of Kuwait. A face-to-face questionnaire with 109 IT practitioners
in Kuwait from government and private organizations was conducted. The
findings reveal and identify risk factors that have a high impact on the
budget, quality, and schedule. The aim of this study is to validate risk factor
taxonomy through quantitative methods by experts in the field of IT. Another
purpose of this research is to provide a comprehensive and updated review of
risk factors from Kuwait to be presented for IT practitioners and researchers.
Software projects’ past goes back to four or more decades. We encounter the first software project risk management paper in 1991[1] and the study [2] reports that in 1995 US spent $250 billion to software projects and these projects had estimated $59 billion in cost overruns and another $81 billion had spent on canceled software projects.Although failures are tremendous, we have observed the project risks and critical success factors are given like shopping lists and so the remedies of risk factors. Very few studies exist for searching the relationships of these risk factors and the relationship between remedies and risk factors. We are trying to construct a simple model of risks and remedies borrowing concepts from systems and control theory.
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
Integration testing is one the important phase in software testing life cycle (STLC). With the fast growth of internet and web services, web-based applications are also growing rapidly and their importance and complexity is also increasing. Heterogeneous and diverse nature of distributed components, applications, along with their multi-platform support and cooperativeness make these applications more complex and swiftly increasing in their size. Quality assurance of these applications is becoming more crucial and important. Testing is one of the key processes to achieve and ensure the quality of these software or Webbased products. There are many testing challenges involved in Web-based applications. But most importantly integration is the most critical testing associated with Web-based applications. There are number of challenging factors involved in integration testing efforts. These factors have almost 70 percent to 80 percent impact on overall quality of Web-based applications. In software industry different kind of testing approaches are used by practitioners to solve the issues associated with integration which are due
to ever increasing complexities of Web-based applications.
Knowledge Management and Predictive Analytics in IT Project Risksijtsrd
"Knowledge management and predictive analytics are considered to be unusual partners in today’s technology. However, they can be very good tools that would solve current problems in valuing data. Predictive analytics has now become one of the forecasting tools that is of huge help in information management. Its application in IT project development risk management is very important, where a lot of raw data is involved with risk analysis and prediction. The use of IT project risk management as supported by knowledge management KM will help increase the success rate of IT projects. Knowledge management will bring about additional value to the data needed. This paper presents the usage of KM and predictive analytics to increase the success ratings of projects by predicting the risks that might happen during project development. It explores how KM and predictive analytics can identify risks in IT project development and give recommendations in evaluating the risks that could affect successful completion of IT projects. Mia Torres-Dela Cruz | Subashini A/P Ganapathy | Noor Zuhaili Binti Mohd Yasin ""Knowledge Management and Predictive Analytics in IT Project Risks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19142.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19142/knowledge-management-and-predictive-analytics-in-it-project-risks/mia-torres-dela-cruz"
Effect of Type of School Management and School
Factors on Educational Performance of Primary
School Children in Navi Mumbai: Multiple
Classification Model
Rita Abbi
Influence of Different Pre-Treatments on Seed
Germination ofAilanthus ExcelsaRoxb.; An
Important Medicinal Tree plant
Prakash. P. Sarwadeand Kavita. P. Sarwade
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
1. IJAPRR Page 29
International Journal of Allied Practice, Research and Review
Website: www.ijaprr.com (ISSN 2350-1294)
Software Risk Factors in Developing E-Governance
Projects
Ms. Harmeet Malhotra
Associate Professor, Computer Science Department, IITM (Affiliated to GGSIPU)
Abstract- Software application development is a complex process that goes through various stages. Huge investments are
being made in developing such applications and if these are developed for government organizations and citizens of the
country then the reliability becomes the foremost factor. The more critical the application is the more risks are there. This
paper discusses the various risks related to various phases of software development life cycle. The challenges that are to be
faced by the development team whether it is related to data capturing or testing and implementation of such applications
need to be handled.
Keywords: E-Governance; software risk management; Information Technology; Software development cycle,
I. INTRODUCTION
The technological innovations and up gradations have led to the emergence of e-governance
projects all over the world. In order to give citizens maximum comfort in availing the services and that
too with minimum cost and effort, the government and other organizations are making use of ICT in
developing such projects. They are investing huge amount of money in such projects so as to connect to
citizens not only in urban but rural areas also in India. People living in rural areas are not technology
savvy and their literacy rate is also low. Therefore, efforts are being made to uplift them by providing
them necessary inputs as and when required with the help of Information and Communication
Technology. Long queues in government offices like passport office, driving license office, etc, lot of
documents in the form of physical files, registers, etc and many other issues pertaining to corruption and
other aspects have been controlled with such e-governance applications and websites. Many IT companies
like HCL, IBM, Infosys, etc are involved in this initiative of government in developing applications for
various government departments thereby helping them in efficient functioning and handling of day-to-day
operations.
2. IJAPRR Page 30
The development of e-governance projects where lot of investment is required is not an easy task.
Lot of members are involved in developing such applications, few of them are technical staff,
departmental staff and sometimes third party consultants are also hired so as to give maximum out of
these projects. The software development processes, metrics, testing and quality assurance tools and
techniques being used are to be chosen in very efficient manner so as to reduce the maintenance cost and
risk factor. The risks involved at each phase of software development life cycle need to be considered,
evaluated and prioritized for the successful implementation of projects. Not only development processes
but preparation of manuals and the documentation part are also very crucial for the maintenance of
software applications. These risks can be both technical and non-technical risks. Proper feasibility should
be conducted before initiating a particular project. The issues pertaining to technological feasibility,
economic feasibility, operational and legal feasibility need to be considered. The evaluation should be
done on each project and cost benefit analysis should be conducted along with SWOT analysis.
II. ANALYSIS RELATED RISK
The e-governance projects involve various types of risks which are discussed as follows:-
Unclear problem definition – Unclear and improper definition of problem statement, goals and
objectives of e-governance projects to be undertaken is a major risk in developing any kind of IT related
projects.
Ambiguity in understanding the goal and objective of the project – Various stakeholders might
interpret the goals in a different way that might lead to conflicts in further stages of project development
lifecycle.
Inappropriate tools and methods of data gathering – Methodologies and techniques used for
information gathering related to the project must be selected properly. Since the data required for such
projects is very crucial and huge in volume so collecting such information requires appropriate
methodologies to be used keeping in mind the security, political and legal aspect also.
Lacunas in conducting operational, technical, economical and legal feasibility study – Such a
huge investment is required in developing these applications so this aspect should be given utmost
importance.
Incomplete or inaccurate Software Requirement Specification (SRS) documentation – SRS works
as an agreement between the development team and government department or organization for which the
project is being developed. If this agreement is incomplete or inappropriate, the further development may
not be correct and lead to failure of the project.
3. IJAPRR Page 31
III. DESIGN RELATED RISKS
Inefficient design model – The pictorial representation for depicting actors involved, processes,
input-output, data flow among processes, etc should be made very clearly in order to increase the
understanding of the system. Thus, data flow diagrams, entity relationship diagrams and other UML
diagrams should be made keeping in mind all the factors involved in the project.
Inconsistency in flow of data – The flow of data from one or more sources is being transformed
into output or stored in data stores after processing is being done. Any inconsistency in flow of data and
information may be risky and affect the success of the system.
Inadequate designing of input screens/output reports – The format of data entry screens should be
user friendly and the chances of wrong entry of data should be minimal. The selection of GUI controls
being used in designing these screens should be done with utmost care. Like calendar controls can be used
wherever date has to be accepted, timer control can be used wherever necessary, and so on. Similarly, the
report format should also try to give the information in clear and precise terms that is easily
understandable by the end user and would help the user in decision making also.
Un-normalized database – The database design should be made keeping in mind all the aspects
such as data redundancy, inconsistency, update or other anomalies, locking techniques and so on. The
DBA must be able to handle this data in an efficient manner because the volume and confidentiality of
this data is much more than other general applications.
IV. IMPLEMENTATION AND TESTING RELATED RISKS
Language barrier – India is a country with different states having different languages and
cultures. So developing an application which can be used by all may require certain language translators.
If these translators are not incorporated properly in these projects, then there might be a risk of its usage
by only few sections of the society thereby overcoming the benefits with respect to investment done on
such projects.
Lack of experienced development team – The development team of such projects comprising of
analysts, programmers, testers, quality analysts, etc must have expertise in the languages, tools and
techniques being used in developing such projects
The risk factors involved in these projects may lead to further success or failure of the
application. The more the preventive measures taken to avoid the risks, the less will be the chances of its
failure. Risk can be correlated with two major software attributes: maintainability and reliability.
Maintenance
Effort
R
i
s
k
Reliability
R
i
s
k
4. IJAPRR Page 32
The more the risk assessment and preventive measures taken the more will be the reliability of the
software. But if not done thoroughly it would be inversely proportional. Similarly if risks are more the
maintenance will also become difficult. Thus risk factor is directly proportional to maintenance.
Fig 1: Categorization of software development risks
5. IJAPRR Page 33
The main challenges in identifying the risks and doing the risk analysis are:-
i) Knowledge about the domain area
ii) Soft-gap between technology and governmental/political issues
iii) Availability of tools for measuring performance of such integrated applications.
iv) Preparing risk analysis document
v) Incorporating change management into risk analysis and prevention
vi) Continuous monitoring, controlling of the progress and impelentation of such huge and complex
projects.
vii) Time, resources and cost constraint
viii) Promoting the application and motivating the end user to take maximum benefit out of it
ix) Proper interpretation of user requirements and getting the consent of all government departments
and other stakeholders
x) Security of confidential data and handling of privacy issues as per cyber laws
V. MEASURES TO MINIMIZE THE TECHNOLOGICAL RISKS
While developing the e-governance projects various issues need to be addressed at earlier stages
of development only. The more preventive measures we will take the lesser the chances of failure. Both,
the hard and soft gaps need to be taken care of because in reality the government organizations are more
considered about the soft factors like people, politics, human culture, etc rather than the hard ideas related
to technology, engineering and so on. Similarly, on the other hand IT application designers are more
concerned about technologies and the government organization culture. So, in order to develop an e-
governance application this gap has to mend and both sides perspective need to be understood.
The first and foremost thing that is very important is the quality of project documentation that is
being developed throughout the software development life cycle. These documents are of utmost
importance because all the stakeholders will be referring them every now and then whether they are the
developers, testers, analysts, maintenance team or government officials and the end users. Each and every
term, data field, code, etc used in the project must be defined in these manuals so that at the time of
maintenance they could be referred and updations can be made easily. Moreover, if required, while
integrating its components with some other projects, it becomes easier if well documented.
Second major issue that needs to be addressed is the priority setting in project building. All the
features and functionalities must be prioritized in order to ensure that the most important functionalities
are given utmost importance in terms of business value and risks and are also completed first. If this
6. IJAPRR Page 34
aspect is neglected then the development team might increase the risk of failure as emphasis was given to
the low priority features as compared to high priority functionalities. Priority Matrix can be built where
the items of importance can be sorted in an order based on certain criteria and then the rating has to be
done. While deciding the criteria and importance, the end users must also be involved. You can quantify
particular criteria by giving them numerical rankings. But while prioritizing the things the constraints and
other project drivers must be considered such as availability of resources, schedule, cost, expertise, etc.
Thirdly, the integration of software tools should be handled carefully. There tools available are of
diverse technologies and methods and can be from the domain of compilers, code generators,
configuration management tools, testing tools, documentation, etc. Sometimes these tools are from
different vendors so integration of such tools becomes a difficult task. Moreover, it is not necessary that
these tools are compatible with the available hardware and software resources. So while integrating these
tools special measures should be taken regarding the standardisation and compatibility issues as well as
the techniques to be used for testing such applications should be chosen with utmost care. Proper
integration planning should be done and testing of these should be performed. Thus you must identify the
best fit from the pool of applications available.
Fourthly, many challenges are there in prioritizing the risks also. For different stakeholders, the
priority of a particular functionality might be different. So to resolve this priority conflict and come to a
consensus is a major challenge for the development firm. Moreover, the requirements and functionalities
of such large projects would be very large. Addressing all these will require maximum efforts and setting
the priorities would be very difficult. Weighing them against all the criteria set will require time,
resources and budget also which is generally a major constraint in almost all IT projects. Next in this
technological era, the requirements change frequently and so do the functionalities so managing this
change with respect to priority setting is very cumbersome. Lastly, in e-governance projects the
prioritization that is to be done is highly influenced by government agencies and politics may also be
involved so the only subjective and biased approached should not be there.
VI. CONCLUSION
In India, highly qualified expertise in the field of Information Technology is available but the
challenges of e-governance projects requiring lot of investment and knowledge are too high. A
customized approach has to be followed in developing these projects. Managing a project is not just
writing of code rather proper integration of people, technology, business, risk and legal management. The
identification of project risks is not the only task to be performed but analyzing the threats, challenges,
consequences is equally important as preventive measures has to be planned accordingly only.
VII. References
[1] Yan Aihua, “Risk Management in Software Development: A Continuous Process”, IS 6840 Term Paper, Fall November 2008
[2] Firesmith Donald, “Prioritizing Requirements”, Journal of Object Technology, Volume 3, September-October 2004
7. IJAPRR Page 35
[3] Bannerman, Paul L. "Risk and risk management in software projects: A reassessment." Journal of Systems and Software 81.12
(2008): 2118-2133.
[4] Boudry Elke, Verdegem Pieter, “The Challenge of Technology: Alignment Dynamics in Local Governments”, The Electronic
Journal of e-Government, Volume 10, Issue 2, December 2012
[5] United Nations e-Government Survey 2008 [Online], Available:
http://unpan3.un.org/egovkb/portals/egovkb/Documents/un/2008-Survey/unpan028607.pdf
[6] Li, Jingyue, Odd Petter N. Slyngstad, and Maurizio Morisio. "A state-of-the-Practice Survey of Risk Management in
Development with Off-the-Shelf Software Componenets." IEEE Transactions on Software Engineering, 2008: 271
[7]Subrahmanyam G.V., “Project Management in e-Governance”, Manage India, Issue 6, November 2011