skip to main content
10.1145/1833310.1833323acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Toward proactive knowledge protection in community-based software development

Published:02 May 2010Publication History

ABSTRACT

Leveraging the abundant community resources, e.g. campus students, programming fans, software amateurs, is promising to be a flexible and effective approach for relieving the enterprise's IT resource shortage. However, the concern about confidential knowledge exposure makes most enterprises hesitate to outsource software development to community resources. Unlike the traditional legal protection mechanism that prevents community resources from exposing the already known confidential knowledge, this paper presents a proactive confidential knowledge protection technology, which prevents the community resources from learning the confidential knowledge in software development activities. First, the client is facilitated on identifying confidential knowledge involved in the software development activity. Then, the risky software design elements that might expose confidential knowledge are identified in both qualitative and quantitative way. Based on the identification result, a holistic proactive protection solution is presented by orchestrating task reservation, task pretending and task partition activities. Finally, the processed software development tasks are dispatched to community developers without worrying about the confidential knowledge exposure. The technology has been preliminarily validated in two community-based software development cases.

References

  1. Alexander Wolfe. Toolkit: Eclipse: A platform becomes an open-source Woodstock. ACM Queue: Tomorrow's Computing Today, 1(8):14--16, November 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barthélemy, J. The hidden costs of IT outsourcing. MIT Sloan Management. Review 42, 3 (Spring 2001), 60--69.Google ScholarGoogle Scholar
  3. Eppinger, S. D. "Model-based approaches to managing concurrent engineering," Journal of Engineering Design, 2(4):283--290, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  4. Hans Kriniger, Intellectual Property Protection Issues in Outsourcing, http://ezinearticles.com/?Intellectual-Property-Protection-Issues-in-Outsourcing&id=930940.Google ScholarGoogle Scholar
  5. Jim Duggan, Jason Byrne, and Gerard J. Lyons, A Task Allocation Optimizer for Software Construction, IEEE Software, Volume 21, Issue 3, Pages: 76--82, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. John K. Halvey, Barbara M. Melby. Information technology outsourcing transactions: process, strategies, and contracts, 2nd Edition. Wiley, 2005.Google ScholarGoogle Scholar
  7. Lacity, M. C. and Wilkocks, L. P. Global Information Technology Outsourcing. Wiley, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Liu Ying, Feng Chenhua, Zhao Wei, Su Hui, Liu Hehui, A Case Study on Community-enabled SOA Application Development, Proceedings of IEEE International Conference on Service-Oriented Computing and Application. Page(s): 309--316, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Pimmler, Eppinger, Integration Analysis of Product Decompositions, Proceedings of the ASME Sixth International Conference on Design Theory and Methodology, Minneapolis, MN, Sept., 1994.Google ScholarGoogle Scholar
  10. REIS, C. R. and FORTES, R. P. M.: An Overview of the Software Engineering Process and Tools in the Mozilla Project, Proc. Workshop on Open Source Software Development, Newcastle, UK, February 2002.Google ScholarGoogle Scholar
  11. Rusnak, J. The Design Structure Analysis System: A Tool to Analyze Software Architecture, Ph.D. thesis, Harvard University, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Steward, D. V. "The Design Structure System: A Method for Managing the Design of Complex Systems." IEEE Transactions on Engineering Management EM-28.3: 71--74, August, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  13. Thebeau, Knowledge Management of System Interfaces and Interactions for Product Development Processes, M.I.T. SM Thesis, 2001.Google ScholarGoogle Scholar

Index Terms

  1. Toward proactive knowledge protection in community-based software development

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHASE '10: Proceedings of the 2010 ICSE Workshop on Cooperative and Human Aspects of Software Engineering
          May 2010
          127 pages
          ISBN:9781605589664
          DOI:10.1145/1833310

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 May 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate47of70submissions,67%

          Upcoming Conference

          ICSE 2025

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader