ABSTRACT
Leveraging the abundant community resources, e.g. campus students, programming fans, software amateurs, is promising to be a flexible and effective approach for relieving the enterprise's IT resource shortage. However, the concern about confidential knowledge exposure makes most enterprises hesitate to outsource software development to community resources. Unlike the traditional legal protection mechanism that prevents community resources from exposing the already known confidential knowledge, this paper presents a proactive confidential knowledge protection technology, which prevents the community resources from learning the confidential knowledge in software development activities. First, the client is facilitated on identifying confidential knowledge involved in the software development activity. Then, the risky software design elements that might expose confidential knowledge are identified in both qualitative and quantitative way. Based on the identification result, a holistic proactive protection solution is presented by orchestrating task reservation, task pretending and task partition activities. Finally, the processed software development tasks are dispatched to community developers without worrying about the confidential knowledge exposure. The technology has been preliminarily validated in two community-based software development cases.
- Alexander Wolfe. Toolkit: Eclipse: A platform becomes an open-source Woodstock. ACM Queue: Tomorrow's Computing Today, 1(8):14--16, November 2003. Google ScholarDigital Library
- Barthélemy, J. The hidden costs of IT outsourcing. MIT Sloan Management. Review 42, 3 (Spring 2001), 60--69.Google Scholar
- Eppinger, S. D. "Model-based approaches to managing concurrent engineering," Journal of Engineering Design, 2(4):283--290, 1991.Google ScholarCross Ref
- Hans Kriniger, Intellectual Property Protection Issues in Outsourcing, http://ezinearticles.com/?Intellectual-Property-Protection-Issues-in-Outsourcing&id=930940.Google Scholar
- Jim Duggan, Jason Byrne, and Gerard J. Lyons, A Task Allocation Optimizer for Software Construction, IEEE Software, Volume 21, Issue 3, Pages: 76--82, 2004. Google ScholarDigital Library
- John K. Halvey, Barbara M. Melby. Information technology outsourcing transactions: process, strategies, and contracts, 2nd Edition. Wiley, 2005.Google Scholar
- Lacity, M. C. and Wilkocks, L. P. Global Information Technology Outsourcing. Wiley, 2001. Google ScholarDigital Library
- Liu Ying, Feng Chenhua, Zhao Wei, Su Hui, Liu Hehui, A Case Study on Community-enabled SOA Application Development, Proceedings of IEEE International Conference on Service-Oriented Computing and Application. Page(s): 309--316, 2007 Google ScholarDigital Library
- Pimmler, Eppinger, Integration Analysis of Product Decompositions, Proceedings of the ASME Sixth International Conference on Design Theory and Methodology, Minneapolis, MN, Sept., 1994.Google Scholar
- REIS, C. R. and FORTES, R. P. M.: An Overview of the Software Engineering Process and Tools in the Mozilla Project, Proc. Workshop on Open Source Software Development, Newcastle, UK, February 2002.Google Scholar
- Rusnak, J. The Design Structure Analysis System: A Tool to Analyze Software Architecture, Ph.D. thesis, Harvard University, 2005. Google ScholarDigital Library
- Steward, D. V. "The Design Structure System: A Method for Managing the Design of Complex Systems." IEEE Transactions on Engineering Management EM-28.3: 71--74, August, 1981.Google ScholarCross Ref
- Thebeau, Knowledge Management of System Interfaces and Interactions for Product Development Processes, M.I.T. SM Thesis, 2001.Google Scholar
Index Terms
- Toward proactive knowledge protection in community-based software development
Recommendations
Yik Yak and the knowledge community
Yik Yak is an anonymous, location-based social networking application that is extremely popular on college campuses across the United States. Because it is known mainly for the controversies it breeds, both scholars and professionals have largely ...
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Identity disclosure is one of the most serious privacy concerns in today's information age. A well-known method for protecting identity disclosure is k-anonymity. A dataset provides k-anonymity protection if the information for each individual in the ...
"Leagile" software development
In recent years there has been a noticeable shift in attention from those who use agile software development toward lean software development, often labelled as a shift "from agile to lean". However, the reality may not be as simple or linear as this ...
Comments