SlideShare a Scribd company logo
1 of 15
Download to read offline
a Document Management System
in defense industry case study
Seval Çapraz
BIL/CMP 781 – Software Quality Management, Fall 2018
Importance of software quality
assurance to prevent and reduce
software failures:
Content
› The Problem
› What is DMS?
› Research goal & Questions
› Initial Findings
› Result
The Problem
› Computer software products can contain various defects which
affect the software quality very much.
› These defects may cause not only financial damage but also many
life losts especially in defence sector.
› Therefore software quality assurance has importance in order to
reduce defects and improve the quality.
› DMS; is an electronic document management system that is in
compliance with internal guidelines and regulations to produce
digital documents which is mainly used in Turkish defence industry.
The Problem (cont.)
› In this study, we discuss how lack of proper software
quality management(SQM) resulted in incidents based on
DMS project.
› We also recommend SQM as a proper solution in various
stage of the software development process especially for
document management systems such as DMS.
What is DMS?
Modules of DMS Line of Code People / Month
Document Management
Module
~2.000.000 600
Archive Module ~16.000 60
DMS is the product of one of the pioneer companies in Turkey
which develops many tools and software solutions for Turkish
defence sector.
DMS manages all processes for digital documents from creation
phase to disposal phase.
Document Management Module
› In compliance with TS13298 (Turkish Standards Institution – 13298),
› In compliance with the e-signature Regulation,
› In compliance with the Regulation on Procedures and Principles,
› Supports power of act attorney procedures,
› Supports E-mail integration,
› Has ability to keep different metadatas for each document type,
› Has ability to view the differences in versions of the documents,
› Supports dynamic workflow process.
Archive Module
› This module allows the documents that expired their life time to be
archived in the system.
› In addition to that, it allows physical archive by letting the users
enter the metadatas for physical documents.
Research goal
& Questions
●
This study aims to discuss the incidents
when the lack of software quality
management and the proposed solutions
based on the document management
systems such as DMS.
What are the incidents and solutions of the
main cause of defects?
Which problems arise when the actual
practice comes into play?
Why software quality management is
important for DMS?
How to find a way to develop high-quality
software at a reasonable price for DMS?
Research goal
& Questions
How to ensure the observation of every
objective, responsibilities and the
guideline?
How to make DMS more compact, cheaper,
and user friendly for the users in defence
industry?
How to make DMS more fault tolerant and
robust?
How to make DMS more secure?
How can we decrease bugs?
How can we decrease new product delivery
time?
How can we protect the system from failure?
Initial Findings
We have to reduce bugs because...
› Software quality is more important in defence industry because
very bad incidents may occur when the lack of software quality
management.
› For example, the system had a bug with transparency of the
watermarks on pdf documents in old releases. When the
watermark on the secret documents is not half-transparent, the
soldiers can not read the document clearly.
› It caused that a soldier bombed wrong destination because the
nontransparent watermark was published on top of the coordinates
of the correct location on the document.
●
In another example, the secret documents should
not be read by non-authorized people.
●
Permission and authorization failures can not be
tolerated in defence industry because enemies can
use any information against the government.
●
A lot of bugs occur in the DMS about permission
and authorization system however they can be
avoided before the disasters by using proper
software quality management.
●
The software development is done by iterative development.
●
The sprints are done in one week.
●
23 people works in the project. 12 of them are software
developers. 4 of them are looking after deployment while
other 4 for team lead. 3 of them are testers.
●
There are no deployment automation tool.
●
The product delivery is done when the system is ready, not
based on a calendar. So it always delays.
●
Bugs are not analyzed and categorized before. We do not
now the root cause of bugs.
●
There are no review meetings with customers.
●
There is a tool (TFS) to track the bugs and tasks.
●
The product tests are done by testers. There is no test
automation tool.
●
The products are not measured for quality.
●
A lot of bugs may occur in the DMS about
usage, permission and authorization system
however they can be avoided before the
disasters by using proper software quality
management.
●
We can diminish the software delivery time
by using software quality management.
●
There are other case studies in literature in
other domains. [1]
Results
[1] Madadipouya, Kasra. "Importance of software quality assurance to
prevent and reduce software failures in medical devices: Therac-25 case study."

More Related Content

What's hot

Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringVijayapriyaP1
 
Software Engineering - Ch1 introduction
Software Engineering - Ch1 introductionSoftware Engineering - Ch1 introduction
Software Engineering - Ch1 introductionRa'Fat Al-Msie'deen
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1IIUI
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering DiversitySayedMokarrom
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introductionVishal Singh
 

What's hot (9)

Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Software Engineering - Ch1 introduction
Software Engineering - Ch1 introductionSoftware Engineering - Ch1 introduction
Software Engineering - Ch1 introduction
 
Lecture 1 introduction to software engineering 1
Lecture 1   introduction to software engineering 1Lecture 1   introduction to software engineering 1
Lecture 1 introduction to software engineering 1
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering Diversity
 
Software ee111
Software ee111Software ee111
Software ee111
 
Software ee1
Software ee1Software ee1
Software ee1
 
An introduction to software engineering
An introduction to software engineeringAn introduction to software engineering
An introduction to software engineering
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 

Similar to A Document Management System in Defense Industry Case Study

Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Seval Çapraz
 
infox technologies
infox technologiesinfox technologies
infox technologiesfidharash
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile softwareijcisjournal
 
Choosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsChoosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsArnav Malhotra
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfbalaji984829
 
Beginner guide-to-software-testing
Beginner guide-to-software-testingBeginner guide-to-software-testing
Beginner guide-to-software-testingbiswajit52
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paperJamesWright
 
Software Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationSoftware Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationProgrameter
 
Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringMohamed Essam
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfProf. Dr. K. Adisesha
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?BoTree Technologies
 
Improving software development
Improving software developmentImproving software development
Improving software developmentNaqib Khan
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12jemtallon
 
Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdfPriyajit Sen
 
Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Education Front
 

Similar to A Document Management System in Defense Industry Case Study (20)

Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...Importance of software quality assurance to prevent and reduce software failu...
Importance of software quality assurance to prevent and reduce software failu...
 
infox technologies
infox technologiesinfox technologies
infox technologies
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile software
 
Choosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And ConsChoosing The Right Data Annotation Option: Pros And Cons
Choosing The Right Data Annotation Option: Pros And Cons
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
 
Software engineering the product
Software engineering the productSoftware engineering the product
Software engineering the product
 
Beginner guide-to-software-testing
Beginner guide-to-software-testingBeginner guide-to-software-testing
Beginner guide-to-software-testing
 
Sdt strw verification white paper
Sdt strw verification white paperSdt strw verification white paper
Sdt strw verification white paper
 
Software Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in OrganizationSoftware Measurement: Lecture 3. Metrics in Organization
Software Measurement: Lecture 3. Metrics in Organization
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Software Processes
Software ProcessesSoftware Processes
Software Processes
 
SE Unit 1
SE Unit 1SE Unit 1
SE Unit 1
 
Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdf
 
6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx6.RISK MANAGEMENT.pptx
6.RISK MANAGEMENT.pptx
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?
 
Dit yvol2iss16
Dit yvol2iss16Dit yvol2iss16
Dit yvol2iss16
 
Improving software development
Improving software developmentImproving software development
Improving software development
 
CISSP Week 12
CISSP Week 12CISSP Week 12
CISSP Week 12
 
Software Engineering Basics.pdf
Software Engineering Basics.pdfSoftware Engineering Basics.pdf
Software Engineering Basics.pdf
 
Lecture1 (SE Introduction)
Lecture1 (SE Introduction)Lecture1 (SE Introduction)
Lecture1 (SE Introduction)
 

More from Seval Çapraz

A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazSeval Çapraz
 
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiYapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiSeval Çapraz
 
Assembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiAssembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiSeval Çapraz
 
Zimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewZimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewSeval Çapraz
 
Software Project Management Plan
Software Project Management PlanSoftware Project Management Plan
Software Project Management PlanSeval Çapraz
 
Distributed Computing Answers
Distributed Computing AnswersDistributed Computing Answers
Distributed Computing AnswersSeval Çapraz
 
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Seval Çapraz
 
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Seval Çapraz
 
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESVARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESSeval Çapraz
 
A Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemA Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemSeval Çapraz
 
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaComparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaSeval Çapraz
 
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...Seval Çapraz
 
Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Seval Çapraz
 
Optical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersOptical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersSeval Çapraz
 
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSpam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSeval Çapraz
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big DataSeval Çapraz
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?Seval Çapraz
 
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Seval Çapraz
 

More from Seval Çapraz (19)

A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
 
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneğiYapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
Yapay Sinir Ağları ile çiftler ticareti finansal tahmin pepsi cocacola örneği
 
Etu Location
Etu LocationEtu Location
Etu Location
 
Assembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search GerçekleştirimiAssembly Dili İle Binary Search Gerçekleştirimi
Assembly Dili İle Binary Search Gerçekleştirimi
 
Zimbra zooms ahead with OneView
Zimbra zooms ahead with OneViewZimbra zooms ahead with OneView
Zimbra zooms ahead with OneView
 
Software Project Management Plan
Software Project Management PlanSoftware Project Management Plan
Software Project Management Plan
 
Distributed Computing Answers
Distributed Computing AnswersDistributed Computing Answers
Distributed Computing Answers
 
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
Statistical Data Analysis on a Data Set (Diabetes 130-US hospitals for years ...
 
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
Statistical Data Analysis on Diabetes 130-US hospitals for years 1999-2008 Da...
 
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINESVARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
VARIABILITY MANAGEMENT IN SOFTWARE PRODUCT LINES
 
A Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation SystemA Content Boosted Hybrid Recommendation System
A Content Boosted Hybrid Recommendation System
 
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on CudaComparison of Parallel Algorithms For An Image Processing Problem on Cuda
Comparison of Parallel Algorithms For An Image Processing Problem on Cuda
 
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
GPU-Accelerated Route Planning of Multi-UAV Systems Using Simulated Annealing...
 
Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)Semantic Filtering (An Image Processing Method)
Semantic Filtering (An Image Processing Method)
 
Optical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized LayersOptical Flow with Semantic Segmentation and Localized Layers
Optical Flow with Semantic Segmentation and Localized Layers
 
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval ÇaprazSpam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
Spam Tanıma İçin Geliştirilmiş Güncel Yöntemlere Genel Bakış | Seval Çapraz
 
Data Streaming For Big Data
Data Streaming For Big DataData Streaming For Big Data
Data Streaming For Big Data
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?
 
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
Bir Android Uygulamasında Bulunması Gereken Özellikler | Seval ZX | Android D...
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

A Document Management System in Defense Industry Case Study

  • 1. a Document Management System in defense industry case study Seval Çapraz BIL/CMP 781 – Software Quality Management, Fall 2018 Importance of software quality assurance to prevent and reduce software failures:
  • 2. Content › The Problem › What is DMS? › Research goal & Questions › Initial Findings › Result
  • 3. The Problem › Computer software products can contain various defects which affect the software quality very much. › These defects may cause not only financial damage but also many life losts especially in defence sector. › Therefore software quality assurance has importance in order to reduce defects and improve the quality. › DMS; is an electronic document management system that is in compliance with internal guidelines and regulations to produce digital documents which is mainly used in Turkish defence industry.
  • 4. The Problem (cont.) › In this study, we discuss how lack of proper software quality management(SQM) resulted in incidents based on DMS project. › We also recommend SQM as a proper solution in various stage of the software development process especially for document management systems such as DMS.
  • 5. What is DMS? Modules of DMS Line of Code People / Month Document Management Module ~2.000.000 600 Archive Module ~16.000 60 DMS is the product of one of the pioneer companies in Turkey which develops many tools and software solutions for Turkish defence sector. DMS manages all processes for digital documents from creation phase to disposal phase.
  • 6. Document Management Module › In compliance with TS13298 (Turkish Standards Institution – 13298), › In compliance with the e-signature Regulation, › In compliance with the Regulation on Procedures and Principles, › Supports power of act attorney procedures, › Supports E-mail integration, › Has ability to keep different metadatas for each document type, › Has ability to view the differences in versions of the documents, › Supports dynamic workflow process.
  • 7. Archive Module › This module allows the documents that expired their life time to be archived in the system. › In addition to that, it allows physical archive by letting the users enter the metadatas for physical documents.
  • 8. Research goal & Questions ● This study aims to discuss the incidents when the lack of software quality management and the proposed solutions based on the document management systems such as DMS. What are the incidents and solutions of the main cause of defects? Which problems arise when the actual practice comes into play? Why software quality management is important for DMS? How to find a way to develop high-quality software at a reasonable price for DMS?
  • 9. Research goal & Questions How to ensure the observation of every objective, responsibilities and the guideline? How to make DMS more compact, cheaper, and user friendly for the users in defence industry? How to make DMS more fault tolerant and robust? How to make DMS more secure? How can we decrease bugs? How can we decrease new product delivery time? How can we protect the system from failure?
  • 11. We have to reduce bugs because... › Software quality is more important in defence industry because very bad incidents may occur when the lack of software quality management. › For example, the system had a bug with transparency of the watermarks on pdf documents in old releases. When the watermark on the secret documents is not half-transparent, the soldiers can not read the document clearly. › It caused that a soldier bombed wrong destination because the nontransparent watermark was published on top of the coordinates of the correct location on the document.
  • 12. ● In another example, the secret documents should not be read by non-authorized people. ● Permission and authorization failures can not be tolerated in defence industry because enemies can use any information against the government. ● A lot of bugs occur in the DMS about permission and authorization system however they can be avoided before the disasters by using proper software quality management.
  • 13. ● The software development is done by iterative development. ● The sprints are done in one week. ● 23 people works in the project. 12 of them are software developers. 4 of them are looking after deployment while other 4 for team lead. 3 of them are testers. ● There are no deployment automation tool. ● The product delivery is done when the system is ready, not based on a calendar. So it always delays.
  • 14. ● Bugs are not analyzed and categorized before. We do not now the root cause of bugs. ● There are no review meetings with customers. ● There is a tool (TFS) to track the bugs and tasks. ● The product tests are done by testers. There is no test automation tool. ● The products are not measured for quality.
  • 15. ● A lot of bugs may occur in the DMS about usage, permission and authorization system however they can be avoided before the disasters by using proper software quality management. ● We can diminish the software delivery time by using software quality management. ● There are other case studies in literature in other domains. [1] Results [1] Madadipouya, Kasra. "Importance of software quality assurance to prevent and reduce software failures in medical devices: Therac-25 case study."