Skip to main content
Log in

On interdisciplinarity between product adoption and vulnerability discovery modeling

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

In the last three decades, Interdisciplinary research has attracted researchers, academicians, and practitioners from the varied field to collaborate and come up with the solution to a problem. This increase in interdisciplinary research is due to its ability to solve complex problems with the help of tools from various disciplines. Interdisciplinary research is based on some of the most important methods that were built through interdisciplinary study to examine and solve a wide variety of business and engineering related problems. Six applications of interdisciplinary research work done in the area of marketing and software security engineering have been discussed in this paper. Specifically, we have discussed the similarity of the modeling framework developed for product adoption using innovation diffusion modeling and vulnerability discovery process. From this work, we aim to provide an understanding to the readers about the importance of interdisciplinary research and its contribution to solving real-life complex decision problems by utilizing the knowledge of various disciplines together.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur 26(3):219–228

    Article  Google Scholar 

  • Anand A, Agarwal M, Bansal G, Garmabaki AHS (2016) Studying product diffusion based on market coverage. J Mark Anal 4(4):135–146

    Article  Google Scholar 

  • Bass FM, Krishnan TV, Jain DC (1994) Why the Bass model fits without decision variables. Mark Sci 13(3):203–223

    Article  Google Scholar 

  • Bass FM (1969) A new-product growth model for consumer durables. Manage Sci 15:215–227

    Article  Google Scholar 

  • Fourt LA, Woodlock JW (1960) Early prediction of market success for new grocery products. J Mark 25(2):31–38

    Article  Google Scholar 

  • Goel AL, Okumoto K (1979) Time dependent error detection rate model for software reliability and other performance measures. IEEE Trans Reliab 28(3):206–211

    Article  Google Scholar 

  • Hull CL (1951) Essentials of behavior. Yale University Press

  • Jha PC, Gupta A, Kapur PK (2008) Bass model revisited. J Stat Manag Syst 11(3):413–437

    MATH  Google Scholar 

  • Kansal Y, Kumar D, Kapur PK (2016) Vulnerability patch modeling. Int J Reliab Qual Saf Eng 23(06):1640013

    Article  Google Scholar 

  • Kansal Y, Kapur PK, Kumar U, Kumar D (2017). Effort and coverage dependent vulnerability discovery modeling. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1–6). IEEE

  • Kapur PK, Garg RB (1992) A software reliability growth model for an error removal phenomenon. Softw Eng J 7:291–294

    Article  Google Scholar 

  • Kapur PK, Garg RB, Kumar S (1999) Contributions to hardware and software reliability. World Scientific, Singapore

    Book  Google Scholar 

  • Kapur PK, Bardhan AK, Jha PC (2004a) An alternative formulation of innovation diffusion model and its extension. Mathematics and Information Theory. Anamaya Publications, New Delhi, India

    Google Scholar 

  • Kapur PK, Singh O, Mittal R (2004b) Software reliability growth and innovation diffusion models: an interface. Int J Reliab Qual Saf Eng 11(04):339–364

    Article  Google Scholar 

  • Kapur PK, Singh VB, Anand S, Yadavalli VSS (2007) An innovation diffusion model incorporating change in the adoption rate. Manag Dyn J South Afr Inst Manag Sci 16(1):34–41

    Google Scholar 

  • Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR application. Springer, Berlin

    Book  Google Scholar 

  • Kapur PK, Yamada S, Aggarwal AG, Shrivastava AK (2013) Optimal price and release time of a software under warranty. Int J Reliab Qual Saf Eng 20(03):1340004

    Article  Google Scholar 

  • Kapur PK, Khatri SK, Singh O, Shrivastava AK (2014). When to stop testing under warranty using SRGM with change-point. In 2014 Conference on IT in Business, Industry and Government (CSIBIG) (pp. 1–7). IEEE

  • Kapur PK, Singh O, Shrivastava AK, Singh JN (2015) A software up-gradation model with testing effort and two types of imperfect debugging. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 613–618). IEEE

  • Kapur PK, Yadavali VS, Shrivastava AK (2015a) A comparative study of vulnerability discovery modeling and software reliability growth modeling. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 246–251). IEEE

  • Kapur PK, Panwar S, Shrivastava AK, Khatri SK (2017) Multi-generation diffusion of technology. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 31–37). IEEE

  • Kapur PK, Singh O, Shrivastava AK (2018) A unified approach for optimal release, patching and testing time of a software. Int J Math Operational Res 13(4):471–491

    Article  MathSciNet  Google Scholar 

  • Khurshid S, Shrivastava AK, Iqbal J (2019) Generalized multi-release framework for fault prediction in open source software. Int J Softw Innov (IJSI) 7(4):86–107

    Article  Google Scholar 

  • Kumar V, Kapur PK, Shrivastava AK, Sharma R (2014) Optimal strategies for price-warranty decision model of software product with dynamic production cost. In Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization (pp. 1–6). IEEE

  • Libai B, Muller E, Peres R (2009) The diffusion of services. J Mark Res 46(2):163–175

    Article  Google Scholar 

  • Mahajan V, Muller E, Srivastava RK (1990) Determination of adopter categories by using innovation diffusion models. J Mark Res 27(1):37–50

    Article  Google Scholar 

  • Mishra P, Shrivastava AK, Kapur PK, Khatri SK (2018) Modeling fault detection phenomenon in multiple sprints for agile software environment. In quality, IT and business operations. Springer, Singapore, pp 251–263

    Google Scholar 

  • Mishra G, Kapur PK, Shrivastava AK (2017) Multi release cost model—a new perspective. Int J Reliab Qual Saf Eng 24(06):1740007

    Article  Google Scholar 

  • Narang S, Kapur PK, Damodaran D, Shrivastava AK (2018) Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int J Reliab Qual Saf Eng 25(01):1850002

    Article  Google Scholar 

  • Narang S, Kapur PK, Damodaran D, and Shrivastava AK (2017) User-based multi-upgradation vulnerability discovery model. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 400–405). IEEE

  • Nam D, Lee J, Lee H (2019) Business analytics adoption process: an innovation diffusion perspective. Int J Inf Manage 49:411–423

    Article  Google Scholar 

  • Rescorla E (2005) Is finding security holes a good idea? IEEE Secur Priv 3(1):14–19

    Article  Google Scholar 

  • Rogers EM (1962) Diffusion of innovations. The Free Press, New York

    Google Scholar 

  • Saraf I, Shrivastava AK, Iqbal J (2020) Generalised fault detection and correction modelling framework for multi-release of software. Int J Ind Syst Eng 34(4):464–493

    Google Scholar 

  • Sharma R, Sibal R, Sabharwal S (2018) Change point modelling in the vulnerability discovery process. In International Conference on Advanced Informatics for Computing Research (pp. 559–568). Springer, Singapore

  • Sharma R, Sibal R, Shrivastava AK (2016) Vulnerability discovery modeling for open and closed source software. Int J Secure Softw Eng (IJSSE) 7(4):19–38

    Article  Google Scholar 

  • Shi X, Fernandes K, Chumnumpan P (2014) Diffusion of multi-generational high-technology products. Technovation 34(3):162–176

    Article  Google Scholar 

  • Shrivastava AK, Sharma R, and Kapur PK (2015) Vulnerability discovery model for a software system using stochastic differential equation. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 199–205). IEEE

  • Shrivastava P, Ivanaj S, Ivanaj V (2016) Strategic technological innovation for sustainable development. Int J Technol Manage 70(1):76–107

    Article  Google Scholar 

  • Shrivastava AK, Das S, Anand A, Singh O (2018) Optimizing price, release, and testing stop time decisions of a software product. Syst Reliab Manag Solut Technol 1:189–202

    Google Scholar 

  • Shrivastava AK, Kapur PK (2018) Development of software reliability growth models with time lag and change-point and a new perspective for release time problem. Math Appl Inf Syst 2:34–52

    Article  Google Scholar 

  • Shrivastava AK, Sharma R (2018) Modeling vulnerability discovery and patching with fixing lag. In International Conference on Advanced Informatics for Computing Research (pp. 569–578). Springer, Singapore

  • Shrivastava AK, Sachdeva N (2019) Generalized software release and testing stop time policy. Int J Qual Reliab Manag. https://doi.org/10.1108/IJQRM-07-2019-0227

    Article  Google Scholar 

  • Singh O, Kapur PK, Shrivastava AK, Das L (2014) A unified approach for successive release of a software under two types of imperfect debugging. In Proceedings of 3rd international conference on reliability, infocom technologies and optimization (pp. 1–6). IEEE

  • Stummer C, Kiesling E, Günther M, Vetschera R (2015) Innovation diffusion of repeat purchase products in a competitive market: an agent-based simulation approach. Eur J Oper Res 245(1):157–167

    Article  Google Scholar 

  • Wang X, Ma R, Li B, Tian D, Wang X (2019) E-WBM: an effort-based vulnerability discovery model. IEEE Access 7:44276–44292

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. K. Kapur.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shrivastava, A.K., Ahluwalia, A.S. & Kapur, P.K. On interdisciplinarity between product adoption and vulnerability discovery modeling. Int J Syst Assur Eng Manag 12, 176–187 (2021). https://doi.org/10.1007/s13198-020-01008-4

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-020-01008-4

Keywords

Navigation