Abstract
In the last three decades, Interdisciplinary research has attracted researchers, academicians, and practitioners from the varied field to collaborate and come up with the solution to a problem. This increase in interdisciplinary research is due to its ability to solve complex problems with the help of tools from various disciplines. Interdisciplinary research is based on some of the most important methods that were built through interdisciplinary study to examine and solve a wide variety of business and engineering related problems. Six applications of interdisciplinary research work done in the area of marketing and software security engineering have been discussed in this paper. Specifically, we have discussed the similarity of the modeling framework developed for product adoption using innovation diffusion modeling and vulnerability discovery process. From this work, we aim to provide an understanding to the readers about the importance of interdisciplinary research and its contribution to solving real-life complex decision problems by utilizing the knowledge of various disciplines together.
Similar content being viewed by others
References
Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur 26(3):219–228
Anand A, Agarwal M, Bansal G, Garmabaki AHS (2016) Studying product diffusion based on market coverage. J Mark Anal 4(4):135–146
Bass FM, Krishnan TV, Jain DC (1994) Why the Bass model fits without decision variables. Mark Sci 13(3):203–223
Bass FM (1969) A new-product growth model for consumer durables. Manage Sci 15:215–227
Fourt LA, Woodlock JW (1960) Early prediction of market success for new grocery products. J Mark 25(2):31–38
Goel AL, Okumoto K (1979) Time dependent error detection rate model for software reliability and other performance measures. IEEE Trans Reliab 28(3):206–211
Hull CL (1951) Essentials of behavior. Yale University Press
Jha PC, Gupta A, Kapur PK (2008) Bass model revisited. J Stat Manag Syst 11(3):413–437
Kansal Y, Kumar D, Kapur PK (2016) Vulnerability patch modeling. Int J Reliab Qual Saf Eng 23(06):1640013
Kansal Y, Kapur PK, Kumar U, Kumar D (2017). Effort and coverage dependent vulnerability discovery modeling. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1–6). IEEE
Kapur PK, Garg RB (1992) A software reliability growth model for an error removal phenomenon. Softw Eng J 7:291–294
Kapur PK, Garg RB, Kumar S (1999) Contributions to hardware and software reliability. World Scientific, Singapore
Kapur PK, Bardhan AK, Jha PC (2004a) An alternative formulation of innovation diffusion model and its extension. Mathematics and Information Theory. Anamaya Publications, New Delhi, India
Kapur PK, Singh O, Mittal R (2004b) Software reliability growth and innovation diffusion models: an interface. Int J Reliab Qual Saf Eng 11(04):339–364
Kapur PK, Singh VB, Anand S, Yadavalli VSS (2007) An innovation diffusion model incorporating change in the adoption rate. Manag Dyn J South Afr Inst Manag Sci 16(1):34–41
Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR application. Springer, Berlin
Kapur PK, Yamada S, Aggarwal AG, Shrivastava AK (2013) Optimal price and release time of a software under warranty. Int J Reliab Qual Saf Eng 20(03):1340004
Kapur PK, Khatri SK, Singh O, Shrivastava AK (2014). When to stop testing under warranty using SRGM with change-point. In 2014 Conference on IT in Business, Industry and Government (CSIBIG) (pp. 1–7). IEEE
Kapur PK, Singh O, Shrivastava AK, Singh JN (2015) A software up-gradation model with testing effort and two types of imperfect debugging. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 613–618). IEEE
Kapur PK, Yadavali VS, Shrivastava AK (2015a) A comparative study of vulnerability discovery modeling and software reliability growth modeling. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 246–251). IEEE
Kapur PK, Panwar S, Shrivastava AK, Khatri SK (2017) Multi-generation diffusion of technology. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 31–37). IEEE
Kapur PK, Singh O, Shrivastava AK (2018) A unified approach for optimal release, patching and testing time of a software. Int J Math Operational Res 13(4):471–491
Khurshid S, Shrivastava AK, Iqbal J (2019) Generalized multi-release framework for fault prediction in open source software. Int J Softw Innov (IJSI) 7(4):86–107
Kumar V, Kapur PK, Shrivastava AK, Sharma R (2014) Optimal strategies for price-warranty decision model of software product with dynamic production cost. In Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization (pp. 1–6). IEEE
Libai B, Muller E, Peres R (2009) The diffusion of services. J Mark Res 46(2):163–175
Mahajan V, Muller E, Srivastava RK (1990) Determination of adopter categories by using innovation diffusion models. J Mark Res 27(1):37–50
Mishra P, Shrivastava AK, Kapur PK, Khatri SK (2018) Modeling fault detection phenomenon in multiple sprints for agile software environment. In quality, IT and business operations. Springer, Singapore, pp 251–263
Mishra G, Kapur PK, Shrivastava AK (2017) Multi release cost model—a new perspective. Int J Reliab Qual Saf Eng 24(06):1740007
Narang S, Kapur PK, Damodaran D, Shrivastava AK (2018) Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int J Reliab Qual Saf Eng 25(01):1850002
Narang S, Kapur PK, Damodaran D, and Shrivastava AK (2017) User-based multi-upgradation vulnerability discovery model. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 400–405). IEEE
Nam D, Lee J, Lee H (2019) Business analytics adoption process: an innovation diffusion perspective. Int J Inf Manage 49:411–423
Rescorla E (2005) Is finding security holes a good idea? IEEE Secur Priv 3(1):14–19
Rogers EM (1962) Diffusion of innovations. The Free Press, New York
Saraf I, Shrivastava AK, Iqbal J (2020) Generalised fault detection and correction modelling framework for multi-release of software. Int J Ind Syst Eng 34(4):464–493
Sharma R, Sibal R, Sabharwal S (2018) Change point modelling in the vulnerability discovery process. In International Conference on Advanced Informatics for Computing Research (pp. 559–568). Springer, Singapore
Sharma R, Sibal R, Shrivastava AK (2016) Vulnerability discovery modeling for open and closed source software. Int J Secure Softw Eng (IJSSE) 7(4):19–38
Shi X, Fernandes K, Chumnumpan P (2014) Diffusion of multi-generational high-technology products. Technovation 34(3):162–176
Shrivastava AK, Sharma R, and Kapur PK (2015) Vulnerability discovery model for a software system using stochastic differential equation. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 199–205). IEEE
Shrivastava P, Ivanaj S, Ivanaj V (2016) Strategic technological innovation for sustainable development. Int J Technol Manage 70(1):76–107
Shrivastava AK, Das S, Anand A, Singh O (2018) Optimizing price, release, and testing stop time decisions of a software product. Syst Reliab Manag Solut Technol 1:189–202
Shrivastava AK, Kapur PK (2018) Development of software reliability growth models with time lag and change-point and a new perspective for release time problem. Math Appl Inf Syst 2:34–52
Shrivastava AK, Sharma R (2018) Modeling vulnerability discovery and patching with fixing lag. In International Conference on Advanced Informatics for Computing Research (pp. 569–578). Springer, Singapore
Shrivastava AK, Sachdeva N (2019) Generalized software release and testing stop time policy. Int J Qual Reliab Manag. https://doi.org/10.1108/IJQRM-07-2019-0227
Singh O, Kapur PK, Shrivastava AK, Das L (2014) A unified approach for successive release of a software under two types of imperfect debugging. In Proceedings of 3rd international conference on reliability, infocom technologies and optimization (pp. 1–6). IEEE
Stummer C, Kiesling E, Günther M, Vetschera R (2015) Innovation diffusion of repeat purchase products in a competitive market: an agent-based simulation approach. Eur J Oper Res 245(1):157–167
Wang X, Ma R, Li B, Tian D, Wang X (2019) E-WBM: an effort-based vulnerability discovery model. IEEE Access 7:44276–44292
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shrivastava, A.K., Ahluwalia, A.S. & Kapur, P.K. On interdisciplinarity between product adoption and vulnerability discovery modeling. Int J Syst Assur Eng Manag 12, 176–187 (2021). https://doi.org/10.1007/s13198-020-01008-4
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-020-01008-4