4.5 Article

Organizational adoption of open source software

期刊

JOURNAL OF SYSTEMS AND SOFTWARE
卷 85, 期 3, 页码 666-682

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2011.09.037

关键词

Open source software; Technology adoption; Industrial practice

向作者/读者索取更多资源

Organizations and individuals can use open source software (OSS) for free, they can study its internal workings, and they can even fix it or modify it to make it suit their particular needs. These attributes make OSS an enticing technological choice for a company. Unfortunately, because most enterprises view technology as a proprietary differentiating element of their operation, little is known about the extent of OSS adoption in industry and the key drivers behind adoption decisions. In this article we examine factors and behaviors associated with the adoption of OSS and provide empirical findings through data gathered from the US Fortune-1000 companies. The data come from each company's web browsing and serving activities, gathered by sifting through more than 278 million web server log records and analyzing the results of thousands of network probes. We show that the adoption of OSS in large US companies is significant and is increasing over time through a low-churn transition, advancing from applications to platforms. Its adoption is a pragmatic decision influenced by network effects. It is likelier in larger organizations and those with many less productive employees, and is associated with IT and knowledge-intensive work and operating efficiencies. (C) 2011 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities

Antonios Gkortzis, Daniel Feitosa, Diomidis Spinellis

Summary: The study found that larger projects are associated with an increase in potential vulnerabilities, and there is a strong correlation between the number of dependencies and vulnerabilities. Source code reuse is neither a solution to eliminate vulnerabilities nor a cause for an excessive number of vulnerabilities.

JOURNAL OF SYSTEMS AND SOFTWARE (2021)

Article Management

Examining the value of flexible logistics offerings

Vaggelis Giannikas, Duncan McFarlane

Summary: This paper discusses the value of flexible logistics services that allow customers to change order requirements after placement. The study shows that such flexible logistics services are beneficial for both retailers and customers, emphasizing their importance in omni-channel commerce.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2021)

Article Computer Science, Artificial Intelligence

Software evolution: the lifetime of fine-grained elements

Diomidis Spinellis, Panos Louridas, Maria Kechagia

Summary: Statistical analysis of source code element lifetime events revealed that code lines have a longer lifespan, with younger lines more likely to be modified or deleted. This behavior appears to be independent from specific characteristics of lines or tokens, as factors influencing their longevity across projects could not be determined.

PEERJ COMPUTER SCIENCE (2021)

Article Engineering, Industrial

Smart city for sustainable urban freight logistics

Shenle Pan, Wei Zhou, Selwyn Piramuthu, Vaggelis Giannikas, Chao Chen

Summary: Sustainability has become a key focus in city logistics management, with smart city technology driving new research opportunities. Smart city is expected to continue evolving in the field of city logistics, with recent research characterized by interdisciplinary approaches and disruptive innovations. The review concludes with a new conceptual framework for sustainable urban freight logistics in smart cities.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2021)

Article Computer Science, Software Engineering

Code smell detection by deep direct-learning and transfer-learning?

Tushar Sharma, Vasiliki Efstathiou, Panos Louridas, Diomidis Spinellis

Summary: This study explores the feasibility of using deep learning models to detect code smells without extensive feature engineering, as well as investigates the possibility of applying transfer-learning in the context of detecting code smells. The results show that deep learning methods can detect code smells, with performance varying depending on the specific smell, and transfer-learning is feasible for implementation smells with comparable performance to direct-learning.

JOURNAL OF SYSTEMS AND SOFTWARE (2021)

Article Multidisciplinary Sciences

Conspicuous corruption: Evidence at a country level

Panos Louridas, Diomidis Spinellis

Summary: People exhibit their status through conspicuous consumption of particular goods or experiences. Higher income is often associated with higher status, but can also lead to unethical behavior. Some individuals engage in illegal activities, like bribery, to acquire restricted goods as a status symbol, as seen in the case of obtaining special license plates in Greece.

PLOS ONE (2021)

Article Management

Evaluating the benefits of picking and packing planning integration in e-commerce warehouses

Shuya Zhong, Vaggelis Giannikas, Jorge Merino, Duncan McFarlane, Jun Cheng, Wei Shao

Summary: This study evaluates the benefits of integrating the planning of order picking and packing processes in e-commerce warehouses and conducts an experimental study to answer relevant research questions. The experimental results show that integrated picking and packing planning can improve performance under different configuration conditions.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2022)

Article Education, Scientific Disciplines

Software Engineering Education Knowledge Versus Industrial Needs

Georgios Liargkovas, Angeliki Papadopoulou, Zoe Kotti, Diomidis Spinellis

Summary: The study found that existing software engineering education knowledge covers certain areas well but has room for improvement, as developers seek more information related to software topics, best practices, and code review.

IEEE TRANSACTIONS ON EDUCATION (2022)

Article Transportation Science & Technology

A data-driven method to assess the causes and impact of delay propagation in air transportation systems

Vaggelis Giannikas, Anna Ledwoch, Goran Stojkovic, Pablo Costas, Alexandra Brintrup, Ahmed Ali Saeed Al-Ali, Vinod Kumar Chauhan, Duncan McFarlane

Summary: This study proposes a data-driven method to analyze the propagation of flight delays and their impact on airline schedules using a multi-layer network approach. Empirical results demonstrate that incorporating information in a multi-layered manner leads to a more robust assessment of delay propagation.

TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2022)

Article Management

Service supply chain resilience: a social-ecological perspective on last-mile delivery operations

Yong Lin, Anlan Chen, Shuya Zhong, Vaggelis Giannikas, Carl Lomas, Tracey Worth

Summary: This research investigates the resilience development of the last-mile delivery service supply chain from a social-ecological perspective integrated with the traditional engineering perspective. The findings identify three pathways to resilience development: stabilization, adaptation, and transformation, as well as three strategic orientations: people orientation, digital orientation, and learning orientation.

INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT (2023)

Article Computer Science, Theory & Methods

Machine Learning for Software Engineering: A Tertiary Study

Zoe Kotti, Rafaila Galanopoulou, Diomidis Spinellis

Summary: Machine learning techniques improve the effectiveness of software engineering lifecycle activities. We collected, assessed, summarized, and categorized 83 reviews on ML for SE published between 2009 and 2022, covering 6,117 primary studies. ML is most commonly applied in software quality and testing, while human-centered areas pose greater challenges. We propose various research challenges and actions for ML in SE, including further empirical validation and industrial studies, reconsideration of deficient SE methods, documentation and automation of data collection and pipeline processes, reexamination of proprietary data distribution by industrial practitioners, and implementation of incremental ML approaches.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Software Engineering

Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis

Zoe Kotti, Georgios Gousios, Diomidis Spinellis

Summary: This study analyzed SE papers and patents to examine the impact of SE research on industry. The research found that SE research has provided practitioners with tools, processes, and methods, and has improved existing products. Further empirical studies are needed to support the need for increased funding for SE research. A formal definition of impact should be agreed upon by academia and industry to guide future research.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Proceedings Paper Computer Science, Software Engineering

Finding Typing Compiler Bugs

Stefanos Chaliasos, Thodoris Sotiropoulos, Diomidis Spinellis, Arthur Gervais, Benjamin Livshits, Dimitris Mitropoulos

Summary: This paper presents a testing framework for validating static typing procedures in compilers. The framework utilizes a program generator to produce programs that are likely to trigger typing compiler bugs and introduces two novel approaches to reveal type inference and soundness compiler bugs. By testing the compilers of three popular JVM languages, the study identifies numerous errors in critical components related to static typing.

PROCEEDINGS OF THE 43RD ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '22) (2022)

Proceedings Paper Computer Science, Information Systems

Clonos: Consistent Causal Recovery for Highly-Available Streaming Dataflows

Pedro F. Silvestre, Marios Fragkoulis, Diomidis Spinellis, Asterios Katsifodimos

Summary: Stream processing is crucial for modern businesses, but ensuring fast and consistent recovery from failures remains a challenge. Clonos is a fault tolerance approach that enforces causally consistent recovery by tracking nondeterminism within the system, achieving instant, local operator recovery with negligible overhead.

SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2021)

Article Computer Science, Software Engineering

Well-Typed Programs Can Go Wrong: A Study of Typing-Related Bugs in JVM Compilers

Stefanos Chaliasos, Thodoris Sotiropoulos, Georgios-Petros Drosos, Charalambos Mitropoulos, Dimitris Mitropoulos, Diomidis Spinellis

Summary: This study focuses on understanding and characterizing typing-related compiler bugs, highlighting that most of the bugs in statically-typed programming languages are caused by the underlying type system implementations and core components related to type operations. Results show that over half of the typing-related bugs manifest as unexpected compile-time errors and parametric polymorphism is the most pervasive feature in the corresponding test cases.

PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL (2021)

Review Computer Science, Software Engineering

A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar

Summary: This study provides a comprehensive view of the challenges and critical success factors in the design, implementation, and evaluation stages of phishing education, training, and awareness (PETA). The findings highlight the need to address human-centric issues, bridge users' knowledge gaps, and adopt personalized approaches to enhance defense against phishing attacks.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Performability evaluation of NoSQL-based storage systems☆

Carlos Araujo, Meuse Oliveira Jr., Bruno Nogueira, Paulo Maciel, Eduardo Tavares

Summary: This paper proposes a method based on stochastic Petri nets for evaluating the consistency levels of storage systems based on NoSQL DBMS. The method takes into account different consistency levels and redundant nodes, and estimates the system's availability, throughput, and the probability of accessing the newest data. Experimental results demonstrate the practical feasibility of this approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Review Computer Science, Software Engineering

Monitoring tools for DevOps and microservices: A systematic grey literature review

L. Giamattei, A. Guerriero, R. Pietrantuono, S. Russo, I. Malavolta, T. Islam, M. Dinga, A. Koziolek, S. Singh, M. Armbruster, J. M. Gutierrez-Martinez, S. Caro-Alvaro, D. Rodriguez, S. Weber, J. Henss, E. Fernandez Vogelin, F. Simon Panojo

Summary: This article presents the results of a systematic study on the available monitoring tools for DevOps and microservices. It provides a classification and analysis of these tools, aiming to be a useful reference for researchers and practitioners in this field.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Harmonizing DevOps taxonomies - A grounded theory study

Jessica Diaz, Jorge Perez, Isaque Alves, Fabio Kon, Leonardo Leite, Paulo Meirelles, Carla Rocha

Summary: This paper presents empirical research on the structure of DevOps teams in software-producing organizations to better understand the organizational structure and characteristics of teams adopting DevOps. A theory of DevOps taxonomies is built through analysis, and its consistency with other taxonomies is tested.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Managing the changing understanding of benefits in software initiatives

Sinan Sigurd Tanilkan, Jo Erskine Hannay

Summary: When deciding to develop new software, it is important to have a clear understanding of the intended benefits. However, our research shows that stakeholders' understanding of benefits often fluctuates during the development process, leading to uncertainty. Therefore, we recommend focusing on helping practitioners embrace changes in their understanding of benefits.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Detecting security vulnerabilities with vulnerability nets

Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang

Summary: This paper presents an approach that combines static analysis tools and manual audits to effectively detect various types of security vulnerabilities. By using a special Petri net representation, the proposed method is able to assist in the detection of taint-style vulnerabilities.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Early analysis of requirements using NLP and Petri-nets

Edgar Sarmiento-Calisaya, Julio Cesar Sampaio do Prado Leite

Summary: This research introduces an automated requirements analysis approach that combines natural language processing, Petri-nets, and visualization techniques to improve the quality of scenario-based specifications, identify defects, and anticipate inconsistencies.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Trace matrix optimization for fault localization

Jian Hu

Summary: This paper proposes a two-stage trace matrix optimization method for fault localization, which addresses the challenges of coincidental correctness and data imbalance in the current trace matrix. Through extensive experiments, significant improvements in fault localization effectiveness are demonstrated.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Hierarchical features extraction and data reorganization for code search

Fan Zhang, Manman Peng, Yuanyuan Shen, Qiang Wu

Summary: This study proposes a novel method called HFEDR that utilizes the hierarchical features of Transformer models and reorganizes training data to improve code search performance. Experimental results demonstrate the effectiveness and rationality of the proposed approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

EsArCost: Estimating repair costs of software architecture erosion using slice technology

Tong Wang, Bixin Li

Summary: Software architecture erosion has a negative impact on software quality, performance, and evolution cost. This paper proposes an approach called EsArCost to locate the causes of architecture erosion and estimate the repair cost of each erosion problem. Experimental results show that EsArCost can effectively and efficiently estimate repair costs.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

SYNTONY: Potential-aware fuzzing with particle swarm optimization

Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian

Summary: This paper proposes a new potential-aware fuzzing scheme called SYNTONY that measures seed potential using multiple objectives and prioritizes promising seeds to increase the number of unique crashes and coverage. Experimental results show that SYNTONY outperforms other fuzzing tools and has high compatibility and expansibility.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

An Empirical Investigation Into the Influence of Software Communities' Cultural and on

Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci

Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

The effects of required security on software development effort

Elaine Venson, Bradford Clark, Barry Boehm

Summary: The software industry has been under pressure to adopt security practices and reduce software vulnerabilities. This study quantifies the effort required to develop secure software in increasing levels of rigor and scope and provides validated cost multipliers for practitioners to estimate proper resources for adopting security practices.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Towards an understanding of intra-defect associations: Implications for defect prediction

Yangyang Zhao, Mingyue Jiang, Yibiao Yang, Yuming Zhou, Hanjie Ma, Zuohua Ding

Summary: Previous studies have ignored the potential associations between modules involved in the same defect, and this comprehensive study explores the implications of intra-defect associations for defect prediction. The majority of defects occur across functions, with implicit dependencies between the modules. By considering intra-defect associations and merging modules, the proposed data processing approach significantly improves defect prediction performance.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Learning to empathize with users through design thinking in hybrid mode: Insights from two educational case studies

Meira Levy, Irit Hadar

Summary: This research sheds new light on how students learn and practice hybrid work in educational settings through two educational studies. The findings show the benefits of new educational programs in fostering empathy and innovation among students, while also highlighting the challenges and opportunities in addressing real challenges.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)