Systematic literature review of Critical success factors on enterprise resource planning post implementation

ZT Butarbutar, PW Handayani… - Cogent Business & …, 2023 - Taylor & Francis
Following the implementation of Enterprise Resource Planning (ERP) systems, a myriad of
challenges and issues may manifest, leading to inefficiencies and resistance from users …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

[PDF][PDF] Open Artificial Intelligence Analysis using ChatGPT Integrated with Telegram Bot

GF Avisyah, IJ Putra, SS Hidayat - Jurnal ELTIKOM, 2023 - academia.edu
Chatbot technology uses natural language processing with artificial intelligence that can
interact quickly in answering a question and producing relevant answer. ChatGPT is the …

Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach

A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …

Security risks of global software development life cycle: Industry practitioner's perspective

RA Khan, SU Khan, MA Akbar… - Journal of Software …, 2024 - Wiley Online Library
Software security has become increasingly important because the malicious attack and
other hacker risks of a computer system have grown popularity in the last few years. As a …

[HTML][HTML] Reinforcement Learning for Efficient Power Systems Planning: A Review of Operational and Expansion Strategies

G Pesántez, W Guamán, J Córdova, M Torres… - Energies, 2024 - mdpi.com
The efficient planning of electric power systems is essential to meet both the current and
future energy demands. In this context, reinforcement learning (RL) has emerged as a …

Exploring Technical Debt in Security Questions on Stack Overflow

JA Edbert, SJ Oishwee, S Karmakar… - 2023 ACM/IEEE …, 2023 - ieeexplore.ieee.org
Background: Software security is crucial to ensure that the users are protected from
undesirable consequences such as malware attacks which can result in loss of data and …

[HTML][HTML] Improving the safety and security of software systems by mediating SAP verification

MF Almufareh, M Humayun - Applied Sciences, 2023 - mdpi.com
Security and performance (SAP) are two critical NFRs that affect the successful completion
of software projects. Organizations need to follow the practices that are vital to SAP …

Secure software development methodologies: a multivocal literature review

A Kudriavtseva, O Gadyatskaya - arXiv preprint arXiv:2211.16987, 2022 - arxiv.org
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce
the attack surface and protect software is adoption of methodologies that apply security at …

Mitigating Software Vulnerabilities through Secure Software Development with a Policy‐Driven Waterfall Model

S Hussain, H Anwaar, K Sultan, U Mahmud… - Journal of …, 2024 - Wiley Online Library
For the past few years, software security has become a pressing issue that needs to be
addressed during software development. In practice, software security is considered after …