SlideShare a Scribd company logo
1 of 15
Download to read offline
a Document Management System
in defense industry case study
Seval Çapraz
BIL/CMP 781 – Software Quality Management, Fall 2018
Importance of software quality
assurance to prevent and reduce
software failures:
Content
› The Problem
› What is DMS?
› Research goal & Questions
› Initial Findings
› Result
The Problem
› Computer software products can contain various defects which
affect the software quality very much.
› These defects may cause not only financial damage but also many
life losts especially in defence sector.
› Therefore software quality assurance has importance in order to
reduce defects and improve the quality.
› DMS; is an electronic document management system that is in
compliance with internal guidelines and regulations to produce
digital documents which is mainly used in Turkish defence industry.
The Problem (cont.)
› In this study, we discuss how lack of proper software
quality management(SQM) resulted in incidents based on
DMS project.
› We also recommend SQM as a proper solution in various
stage of the software development process especially for
document management systems such as DMS.
What is DMS?
Modules of DMS Line of Code People / Month
Document Management
Module
~2.000.000 600
Archive Module ~16.000 60
DMS is the product of one of the pioneer companies in Turkey
which develops many tools and software solutions for Turkish
defence sector.
DMS manages all processes for digital documents from creation
phase to disposal phase.
Document Management Module
› In compliance with TS13298 (Turkish Standards Institution – 13298),
› In compliance with the e-signature Regulation,
› In compliance with the Regulation on Procedures and Principles,
› Supports power of act attorney procedures,
› Supports E-mail integration,
› Has ability to keep different metadatas for each document type,
› Has ability to view the differences in versions of the documents,
› Supports dynamic workflow process.
Archive Module
› This module allows the documents that expired their life time to be
archived in the system.
› In addition to that, it allows physical archive by letting the users
enter the metadatas for physical documents.
Research goal
& Questions
●
This study aims to discuss the incidents
when the lack of software quality
management and the proposed solutions
based on the document management
systems such as DMS.
What are the incidents and solutions of the
main cause of defects?
Which problems arise when the actual
practice comes into play?
Why software quality management is
important for DMS?
How to find a way to develop high-quality
software at a reasonable price for DMS?
Research goal
& Questions
How to ensure the observation of every
objective, responsibilities and the
guideline?
How to make DMS more compact, cheaper,
and user friendly for the users in defence
industry?
How to make DMS more fault tolerant and
robust?
How to make DMS more secure?
How can we decrease bugs?
How can we decrease new product delivery
time?
How can we protect the system from failure?
Initial Findings
We have to reduce bugs because...
› Software quality is more important in defence industry because
very bad incidents may occur when the lack of software quality
management.
› For example, the system had a bug with transparency of the
watermarks on pdf documents in old releases. When the
watermark on the secret documents is not half-transparent, the
soldiers can not read the document clearly.
› It caused that a soldier bombed wrong destination because the
nontransparent watermark was published on top of the coordinates
of the correct location on the document.
●
In another example, the secret documents should
not be read by non-authorized people.
●
Permission and authorization failures can not be
tolerated in defence industry because enemies can
use any information against the government.
●
A lot of bugs occur in the DMS about permission
and authorization system however they can be
avoided before the disasters by using proper
software quality management.
●
The software development is done by iterative development.
●
The sprints are done in one week.
●
23 people works in the project. 12 of them are software
developers. 4 of them are looking after deployment while
other 4 for team lead. 3 of them are testers.
●
There are no deployment automation tool.
●
The product delivery is done when the system is ready, not
based on a calendar. So it always delays.
●
Bugs are not analyzed and categorized before. We do not
now the root cause of bugs.
●
There are no review meetings with customers.
●
There is a tool (TFS) to track the bugs and tasks.
●
The product tests are done by testers. There is no test
automation tool.
●
The products are not measured for quality.
●
A lot of bugs may occur in the DMS about
usage, permission and authorization system
however they can be avoided before the
disasters by using proper software quality
management.
●
We can diminish the software delivery time
by using software quality management.
●
There are other case studies in literature in
other domains. [1]
Results
[1] Madadipouya, Kasra. "Importance of software quality assurance to
prevent and reduce software failures in medical devices: Therac-25 case study."

More Related Content

What's hot

Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringVijayapriyaP1
 
Software Engineering - Ch1 introduction
Software Engineering - Ch1 introductionSoftware Engineering - Ch1 introduction
Software Engineering - Ch1 introductionRa'Fat Al-Msie'deen
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1IIUI
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering DiversitySayedMokarrom
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introductionVishal Singh
 

What's hot (9)

Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Software Engineering - Ch1 introduction
Software Engineering - Ch1 introductionSoftware Engineering - Ch1 introduction
Software Engineering - Ch1 introduction
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering Diversity
 
Software ee111
Software ee111Software ee111
Software ee111
 
Software ee1
Software ee1Software ee1
Software ee1
 
An introduction to software engineering
An introduction to software engineeringAn introduction to software engineering
An introduction to software engineering
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 

Similar to A Document Management System in Defense Industry Case Study

Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Seval Çapraz
 
infox technologies
infox technologiesinfox technologies
infox technologiesfidharash
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile softwareijcisjournal
 
Choosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsChoosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsArnav Malhotra
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfbalaji984829
 
Beginner guide-to-software-testing
Beginner guide-to-software-testingBeginner guide-to-software-testing
Beginner guide-to-software-testingbiswajit52
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paperJamesWright
 
Software Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationSoftware Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationProgrameter
 
Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringMohamed Essam
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfProf. Dr. K. Adisesha
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?BoTree Technologies
 
Improving software development
Improving software developmentImproving software development
Improving software developmentNaqib Khan
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12jemtallon
 
Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdfPriyajit Sen
 
Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Education Front
 

Similar to A Document Management System in Defense Industry Case Study (20)

Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...
 
infox technologies
infox technologiesinfox technologies
infox technologies
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile software
 
Choosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsChoosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And Cons
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
 
Software engineering the product
Software engineering the productSoftware engineering the product
Software engineering the product
 
Beginner guide-to-software-testing
Beginner guide-to-software-testingBeginner guide-to-software-testing
Beginner guide-to-software-testing
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paper
 
Software Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationSoftware Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in Organization
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Software Processes
Software ProcessesSoftware Processes
Software Processes
 
SE Unit 1
SE Unit 1SE Unit 1
SE Unit 1
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdf
 
6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?
 
Dit yvol2iss16
Dit yvol2iss16Dit yvol2iss16
Dit yvol2iss16
 
Improving software development
Improving software developmentImproving software development
Improving software development
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdf
 
Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Lecture1 (SE Introduction)
Lecture1 (SE Introduction)
 

More from Seval Çapraz

A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
 
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiYapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiSeval Çapraz
 
Assembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiAssembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiSeval Çapraz
 
Zimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewZimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewSeval Çapraz
 
Software Project Management Plan
Software Project Management PlanSoftware Project Management Plan
Software Project Management PlanSeval Çapraz
 
Distributed Computing Answers
Distributed Computing AnswersDistributed Computing Answers
Distributed Computing AnswersSeval Çapraz
 
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Seval Çapraz
 
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Seval Çapraz
 
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESVARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESSeval Çapraz
 
A Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemA Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemSeval Çapraz
 
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaComparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaSeval Çapraz
 
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...Seval Çapraz
 
Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Seval Çapraz
 
Optical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersOptical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersSeval Çapraz
 
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSpam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSeval Çapraz
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big DataSeval Çapraz
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?Seval Çapraz
 
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Seval Çapraz
 

More from Seval Çapraz (19)

A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
 
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiYapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
 
Etu Location
Etu LocationEtu Location
Etu Location
 
Assembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiAssembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search Gerçekleştirimi
 
Zimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewZimbra zooms ahead with OneView
Zimbra zooms ahead with OneView
 
Software Project Management Plan
Software Project Management PlanSoftware Project Management Plan
Software Project Management Plan
 
Distributed Computing Answers
Distributed Computing AnswersDistributed Computing Answers
Distributed Computing Answers
 
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
 
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
 
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESVARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
 
A Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemA Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation System
 
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaComparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
 
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
 
Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)
 
Optical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersOptical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized Layers
 
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSpam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big Data
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?
 
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

A Document Management System in Defense Industry Case Study

  • 1. a Document Management System in defense industry case study Seval Çapraz BIL/CMP 781 – Software Quality Management, Fall 2018 Importance of software quality assurance to prevent and reduce software failures:
  • 2. Content › The Problem › What is DMS? › Research goal & Questions › Initial Findings › Result
  • 3. The Problem › Computer software products can contain various defects which affect the software quality very much. › These defects may cause not only financial damage but also many life losts especially in defence sector. › Therefore software quality assurance has importance in order to reduce defects and improve the quality. › DMS; is an electronic document management system that is in compliance with internal guidelines and regulations to produce digital documents which is mainly used in Turkish defence industry.
  • 4. The Problem (cont.) › In this study, we discuss how lack of proper software quality management(SQM) resulted in incidents based on DMS project. › We also recommend SQM as a proper solution in various stage of the software development process especially for document management systems such as DMS.
  • 5. What is DMS? Modules of DMS Line of Code People / Month Document Management Module ~2.000.000 600 Archive Module ~16.000 60 DMS is the product of one of the pioneer companies in Turkey which develops many tools and software solutions for Turkish defence sector. DMS manages all processes for digital documents from creation phase to disposal phase.
  • 6. Document Management Module › In compliance with TS13298 (Turkish Standards Institution – 13298), › In compliance with the e-signature Regulation, › In compliance with the Regulation on Procedures and Principles, › Supports power of act attorney procedures, › Supports E-mail integration, › Has ability to keep different metadatas for each document type, › Has ability to view the differences in versions of the documents, › Supports dynamic workflow process.
  • 7. Archive Module › This module allows the documents that expired their life time to be archived in the system. › In addition to that, it allows physical archive by letting the users enter the metadatas for physical documents.
  • 8. Research goal & Questions ● This study aims to discuss the incidents when the lack of software quality management and the proposed solutions based on the document management systems such as DMS. What are the incidents and solutions of the main cause of defects? Which problems arise when the actual practice comes into play? Why software quality management is important for DMS? How to find a way to develop high-quality software at a reasonable price for DMS?
  • 9. Research goal & Questions How to ensure the observation of every objective, responsibilities and the guideline? How to make DMS more compact, cheaper, and user friendly for the users in defence industry? How to make DMS more fault tolerant and robust? How to make DMS more secure? How can we decrease bugs? How can we decrease new product delivery time? How can we protect the system from failure?
  • 11. We have to reduce bugs because... › Software quality is more important in defence industry because very bad incidents may occur when the lack of software quality management. › For example, the system had a bug with transparency of the watermarks on pdf documents in old releases. When the watermark on the secret documents is not half-transparent, the soldiers can not read the document clearly. › It caused that a soldier bombed wrong destination because the nontransparent watermark was published on top of the coordinates of the correct location on the document.
  • 12. ● In another example, the secret documents should not be read by non-authorized people. ● Permission and authorization failures can not be tolerated in defence industry because enemies can use any information against the government. ● A lot of bugs occur in the DMS about permission and authorization system however they can be avoided before the disasters by using proper software quality management.
  • 13. ● The software development is done by iterative development. ● The sprints are done in one week. ● 23 people works in the project. 12 of them are software developers. 4 of them are looking after deployment while other 4 for team lead. 3 of them are testers. ● There are no deployment automation tool. ● The product delivery is done when the system is ready, not based on a calendar. So it always delays.
  • 14. ● Bugs are not analyzed and categorized before. We do not now the root cause of bugs. ● There are no review meetings with customers. ● There is a tool (TFS) to track the bugs and tasks. ● The product tests are done by testers. There is no test automation tool. ● The products are not measured for quality.
  • 15. ● A lot of bugs may occur in the DMS about usage, permission and authorization system however they can be avoided before the disasters by using proper software quality management. ● We can diminish the software delivery time by using software quality management. ● There are other case studies in literature in other domains. [1] Results [1] Madadipouya, Kasra. "Importance of software quality assurance to prevent and reduce software failures in medical devices: Therac-25 case study."