A critical look at the relationship between AI and software engineering

Author(s):  
W.T. Tsai ◽  
K.G. Heisler ◽  
D. Volovik ◽  
I.A. Zualkernan
2012 ◽  
Vol 3 (1) ◽  
pp. 1-13 ◽  
Author(s):  
Diana-Marcela Vásquez-Bravo ◽  
Maria-Isabel Sánchez-Segura ◽  
Fuensanta Medina-Domínguez ◽  
Antonio Amescua

Knowledge elicitation process allows acquiring and transferring the knowledge. This process presents difficulties to select the appropriate elicitation technique. This paper presents a classification of the elicitation techniques used in software engineering and the relationship between the elicitation techniques and some elements of knowledge management as assets knowledge, epistemological dimension of knowledge and the knowledge creation phases. This classification provides a guideline to select a technique or a set of techniques for knowledge elicitation based on phases of Nonaka’s model.


2009 ◽  
pp. 98-113 ◽  
Author(s):  
Nancy R. Mead ◽  
Dan Shoemaker

This chapter describes methods of incorporating security requirements engineering into software engineering courses and curricula. The chapter discusses the importance of security requirements engineering and the relationship of security knowledge to general computing knowledge by comparing a security body of knowledge to standard computing curricula. Then security requirements is related to standard computing curricula and educational initiatives in security requirements engineering are described, with their results. An expanded discussion of the SQUARE method in security requirements engineering case studies is included, as well as future plans in the area. Future plans include the development and teaching of academic course materials in security requirements engineering, which will then be made available to educators. The authors hope that more educators will be motivated to teach security requirements engineering in their software engineering courses and to incorporate it in their curricula.


2020 ◽  
Author(s):  
Gabrielle Minohara ◽  
Carla Rocha ◽  
Joenio Costa ◽  
Paulo Meirelles

BACKGROUND Health Informatics Systems (HIS) draw more attention as their benefits are further explored and becoming more evident. The improvement of patient care and the quality of health services are examples of such advantages. Nevertheless, proprietary systems are not always viable due to their high costs. OBJECTIVE We investigated the benefits and challenges of Open-Source Health informatics Systems (OHIS) adoption discussed in the literature, and we also mapped the real-world OHIS projects, with their technical and community characteristics. Both results guide us to address the aspects that still need to be overcome and also to identify the criteria to help managers and IT professionals in choosing the most suitable OHIS for their context. METHODS We conducted a Systematic Mapping Study to review the literature and also mined source code repositories of OHIS projects. We employ well-consolidated methods from the software engineering community, and we differentiate from similar related works by the use of a more systematic method and also to evaluate OHIS projects using objective software engineering metrics and artifacts. RESULTS We found 500 papers and 151 projects, selecting 26 works to analyze thoroughly and mining 38 active OHIS repositories. We mapped the benefits and challenges to adopt OHIS projects and identified the legal and technical characteristics of them. We propose a conceptual map to illustrate the relationship among all the OHIS adoption benefits. We then correlate how technical and documental artifacts from an OHIS project affect their expected benefits and challenges. Thus, we recommend a set of artifacts and metrics well established in the OSS community as the criteria necessary to evaluate an OHIS solution from a software engineering perspective. CONCLUSIONS OSS projects increase the quality of the HIS and solve several problems that are mostly linked with proprietary solutions. The OHIS ecosystem provides several possible solutions for adoption. However, one barrier to its adoption is misconceptions and misinformation on OSS in the HIS context. We address this challenge with a set of recommended aspects to OHIS project adoption to assist managers and IT professionals in evaluating OHIS solutions. Finally, we highlight the necessity of more research to cover specific technical challenges on OHIS adoption.


Sign in / Sign up

Export Citation Format

Share Document