• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Analyzing research communities in Enterprise Architecture : A Data-Driven Systematic Literature Review / Analysering av forskargrupper inom Enterprise Architecture : En datadriven systematisk litteraturöversikt

Tham, Emelie January 2021 (has links)
The field of Enterprise Architecture (EA) emerged as an answer to the increasing complexity in managing and aligning the business-IT relationship within enterprises. Both practitioners and academics have expressed interest in the field, with a growing number of publicized works related to EA. In an attempt to provide an outlook of the current research landscape of EA, a systematic literature review was conducted. Citation data from the Scopus (Elsevier) API were automatically extracted and analyzed. By applying the Louvain method on the collected data, 8 research communities and their topic were identified: (1) Enterprise Engineering (I & II), (2) Enterprise Architecture Management, (3) Enterprise Modelling, (4) IT Architecture, (5) Enterprise Integration, (6) Digital Transformation, and (7) Smart Cities. For each community, a summarized description with sub-community graphs as well as tables (describing the top authors, articles, and affiliation countries) are presented. Lastly, a comparison of the results and the EA trends identified by Gampfer et al. are presented. / Fältet Enterprise Architecture (EA) framkom som ett svar på den ökande komplexiteten i att hantera och anpassa affärs-IT-relationen inom företag. Både utövare och akademiker har uttryckt intresse för området, då antal publicerade verk relaterade till EA fortsätter att växa. I ett försök att ge en syn på det aktuella forskningslandskapet inom EA genomfördes ett systematisk litteraturöversikt. Citeringsdata från Scopus (Elsevier) API extraherades och analyserades automatiskt. Genom att tillämpa Louvain-metoden på insamlade datan identifierades 8 forskarsamhällen och deras ämnen: (1) Enterprise Engineering (I & II), (2) Enterprise Architecture Management, (3) Enterprise Modelling, (4) IT Architecture, (5) Enterprise Integration, (6) Digital Transformation och (7) Smart Cities. För varje gemenskap gavs en sammanfattad beskrivning med undergruppsdiagram samt tabeller (över t.ex. de främsta författarna, artiklarna, och anslutningsländerna). Slutligen så gjordes en jämförelse av resultaten och de EA trender som identifierats av Gampfer et al.
2

Security Tools in DevSecOps : A Systematic Literature Review / Säkerhetsverktyg i DevSecOps : En systematisk litteraturöversikt

Martelleur, Joel, Hamza, Amina January 2022 (has links)
DevSecOps emerged to mitigate the challenges of integrating security into DevOps. DevOps have grown tremendously, leading to difficulties in integrating security tools in its development process while maintaining speed and agility. This study aims to investigate the security tools in DevSecOps and how they have been reported in previous literature. The main objective of this study is to provide a knowledge base concerning security tools in DevSecOps that can be used to mitigate challenges regarding the selection and use of security tools in the context of DevSecOps. A systematic literature review was adopted for the research. The study collected a total of  228 studies published between 2015 and 2022; fourteen of these papers were selected to be used for data extraction after conducting a thorough review protocol. This study has identified thirteen security tool categories used or recommended to be used in DevSecOps. These tools have been structured into seven phases of the development process and five security practices. Additionally, this study has identified twelve drawbacks and sixteen recommendations concerning the use of these security tools in DevSecOps.  The security tools categories, recommendations, and drawbacks identified in this study could potentially be used to facilitate the challenges of selecting and using security tools in DevSecOps and similar methodologies that rely on automation and delivering software frequently.

Page generated in 0.1082 seconds