IJEM Vol. 6, No. 1, 8 Jan. 2016
Cover page and Table of Contents: PDF (size: 382KB)
Full Text (PDF, 382KB), PP.10-27
Views: 0 Downloads: 0
Scrum, Product Backlog, Rapid Application Development, Agile Software Development, Extreme Programming, Software Quality Assurance
Product maintenance techniques have significant importance because they are much cost effective and less time consuming to maintain a product or software rather to change it. There are different product maintenance and support techniques. These previous techniques do not solve user/clients bugs, issues and enhancements effectively and efficiently. Scrum is being used now a day as a quick, flexible and holistic methodology to develop software. In Scrum projects there is the much customer involvement is included which help to develop a user oriented product. Users can change their requirements in Scrum. Many techniques have been proposed for product maintenance and support. However, in this paper, there have been a detailed literature review of existing product maintenance techniques and also presented a new proposed model and technique for the product maintenance by using Scrum methodology. This Scrum based model for maintenance is designed and based on the analysis of client request types and severity (priority). In our approach, The Session attendees (Scrum Master, Product Owner and Team) choose that bug, issue or enhancement first which has an urgent type or higher priority request and resolves it then select low priority request or non urgent requests and facilitates the clients in timely manner. In this way this proposed model works effectively and defiantly to meet the customer's demand. A comprehensive study on product maintenance and support has been carried out which adds to the current practices in the scrum. We found that maintenance phase of the scrum has been given less attention in the existing literature. In view of this, we have made an attempt to propose a novel model that focuses on the maintenance phase of scrum.
Riffat Naz, M. N. A. Khan, Muhammad Aamir,"Scrum-Based Methodology for Product Maintenance and Support", International Journal of Engineering and Manufacturing(IJEM), Vol.6, No.1, pp.10-27, 2016. DOI: 10.5815/ijem.2016.01.02
[1] V. Rajlich (2014, May). Software evolution and maintenance. In Proceedings of the on Future of Software Engineering (pp. 133-144). ACM.
[2] S. Omanovic & E. Buza (2013, October). Importance of stable velocity in agile maintenance. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-8). IEEE.
[3] B. Frakes, & K. Kang, (2005). Software reuse research: Status and future. IEEE transactions on Software Engineering, 31(7), 529-536.
[4] L. Lin, W. Yang, & J. Lin, (2012). A layer-based method for rapid software development. Computers & Mathematics with Applications, 64(5), 1364-1375.
[5] O. Sohaib, & K. Khan, (2011). Incorporating discount usability in extreme programming. International Journal on Software Engineering and its Applications, 5(1), 51-61.
[6] J.Lin, C.Lin, & W.Yang, (2013, December). A Method-Based Tool Support for Rapid Software Development and Effective Process Management. In Software Engineering (WCSE), 2013 Fourth World Congress on (pp. 115-118). IEEE.
[7] A. Gerber, A. Van Der, & R. Alberts, (2007). Practical implications of rapid development methodologies. Computer Science and Information Technology Education Conference.
[8] F. Rousseaux, & K. Lhoste, (2009, February). Rapid Software Prototyping Using Ajax and Google Map API. In Advances in Computer-Human Interactions, 2009. ACHI'09. Second International Conferences on (pp. 317-323). IEEE.
[9] R. Maschotta, S. Jager, T. Jungebloud, & A. Zimmermann, (2013, April). A framework for agile development of simulation-based system design tools. In Systems Conference (SysCon), 2013 IEEE International (pp. 861-866). IEEE.
[10] H. Chehili, L. Seinturier, & M. Boufaida, (2013, August). FASOAD: A framework for agile service-oriented architectures development. In Database and Expert Systems Applications (DEXA), 2013 24th International Workshop on (pp. 222-226). IEEE.
[11] R. Loffler, B. Guldali, & S. Geisen, (2010). Towards Model-based Acceptance Testing for Scrum. Softwaretechnik-Trends, GI.
[12] K. Vlaanderen, S. Jansen, S. Brinkkemper & E. Jaspers (2011). The agile requirements refinery: Applying SCRUM principles to software product management. Information and Software Technology, 53(1), 58-70.
[13] W.Schramm, C. Draeger, & T. Grechenig (2011, September). Issues and mitigation strategies when using agile industrial software development processes in student software engineering projects. In AFRICON, 2011 (pp. 1-4). IEEE.
[14] S. Omanovic & E. Buza (2013, October). Importance of stable velocity in agile maintenance. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-8). IEEE.
[15] T. Khalane & M. Tanner (2013, November). Software quality assurance in Scrum: The need for concrete guidance on SQA strategies in meeting user expectations. In Adaptive Science and Technology (ICAST), 2013 International Conference on (pp. 1-6). IEEE.
[16] V.A. Santos, A. Goldman, A. C. M Shinoda, and A. L. Fischer, (2011, July). A view towards Organizational Learning: An empirical study on Scrum implementation. In SEKE (pp. 583-589).
[17] V. Rajlich (2014, May). Software evolution and maintenance. In Proceedings of the on Future of Software Engineering (pp. 133-144). ACM.
[18] K. Vlaanderen, S. Jansen, S. Brinkkemper & E. Jaspers (2011). The agile requirements refinery: Applying SCRUM principles to software product management. Information and Software Technology, 53(1), 58-70.
[19] S. Omanovic & E. Buza (2013, October). Importance of stable velocity in agile maintenance. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-8). IEEE.
[20] U.Z. Khan,F. Wahab, and S. Saeed, (2014). Integration of Scrum with Win-Win Requirements Negotiation Model. Middle-East Journal of Scientific Research, 19(1), 101-104.
[21] S. Iqbal, M. Khalid, M. N. A. Khan, "A Distinctive Suite of Performance Metrics for Software Design", International Journal of Software Engineering & Its Applications, vol. 7, no. 5, (2013).
[22] S. Iqbal and M. N. A. Khan, "Yet another Set of Requirement Metrics for Software Projects", International Journal of Software Engineering & Its Applications, vol. 6, no. 1, (2012).
[23] M. Faizan, S. Ulhaq, M. N. A. Khan, "Defect Prevention and Process Improvement Methodology for Outsourced Software Projects", Middle-East Journal of Scientific Research, vol. 19, no. 5, (2014), pp. 674-682.
[24] M. Faizan, M. N.A. Khan, S. Ulhaq, "Contemporary Trends in Defect Prevention", A Survey Report. International Journal of Modern Education & Computer Science, vol. 4, no. 3, (2012).
[25] K. Khan, A. Khan, M. Aamir and M. N. A. Khan, "Quality Assurance Assessment in Global Software Development" World Applied Sciences Journal, vol. 24, no. 11, (2013).
[26] M. Amir, K. Khan, A. Khan, M. N. A. Khan, "An Appraisal of Agile Software Development Process", International Journal of Advanced Science & Technology, vol. 58, (2013).
[27] M. Khan and M. N. A. Khan, "Exploring Query Optimization Techniques in Relational Databases", International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[28] M. N. A. Khan, M. Khalid and S. UlHaq, "Review of Requirements Management Issues in Software Development", International Journal of Modern Education & Computer Science, vol. 5, no. (1), (2013).
[29] M. Umar and M. N. A. Khan, "A Framework to Separate Non Functional Requirements for System Maintainability", Kuwait Journal of Science & Engineering, vol. 39, no. 1 B, (2012), pp. 211- 231.
[30] M. Umar and M. N. A. Khan, Analyzing Non-Functional Requirements (NFRs) for software development. In IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), (2011), pp. 675-678).
[31] M. N. A. Khan, C. R. Chatwin and R. C. Young, "A framework for post-event timeline reconstruction using neural networks", digital investigation, vol. 4, no. 3, (2007), pp. 146-157.
[32] M. N. A. Khan, C. R. Chatwin and R. C. Young, "Extracting Evidence from File system Activity using Bayesian Networks", International journal of Forensic computer science, vol. 1, (2007), pp. 50-63.
[33] M. N. A. Khan, "Performance analysis of Bayesian networks and neural networks in classification of file system activities", Computers & Security, vol. 31, no. 4, (2012), pp. 391-401.
[34] M. Rafique and M. N. A. Khan, "Exploring Static and Live Digital Forensics: Methods, Practices and Tools", International Journal of Scientific & Engineering Research, vol. 4, no. 10, (2013), pp. 1048-1056.
[35] M. S. Bashir and M. N. A. Khan, "Triage in Live Digital Forensic Analysis", International journal of Forensic Computer Science, vol. 1, (2013), pp. 35-44.
[36] A. Sarwar and M. N. A. Khan, "A Review of Trust Aspects in Cloud Computing Security", International Journal of Cloud Computing and Services Science (IJCLOSER), vol. 2, no. 2, (2013), pp. 116-122.
[37] A. H. Gondal and M. N. A. Khan, "A review of fully automated techniques for brain tumor detection from MR images", International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 2, (2013), pp. 55.
[38] A. Zia and M. N. A. Khan, "Identifying key challenges in performance issues in cloud computing", International Journal of Modern Education and Computer Science (IJMECS), vol. 4, no. 10, (2012), pp. 59.
[39] K. U. Rehman and M. N. A. Khan, "The Foremost Guidelines for Achieving Higher Ranking in Search Results through Search Engine Optimization", International Journal of Advanced Science and Technology, vol. 52, (2013), pp. 101-110.
[40] M. Khan and M. N. A. Khan, "Exploring query optimization techniques in relational databases", International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[41] R. Shehzad, M. N. KHAN and M. Naeem, "Integrating knowledge management with business intelligence processes for enhanced organizational learning", International Journal of Software Engineering and Its Applications, vol. 7, no. 2, (2013), pp. 83-91.
[42] S. U. Haq, M. Raza, A. Zia and M. N. A. Khan, "Issues in global software development: A critical review", An Appraisal of Off-line Signature Verification Techniques 75 Copyright © 2015 MECS I.J. Modern Education and Computer Science, vol. 4, (2015), pp. 67-75 Journal of Software Engineering and Applications, vol. 4, no. 10, (2015), pp. 590.
[43] A. Zia and M. N. A. Khan, "A Scheme to Reduce Response Time in Cloud Computing Environment", International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 6, (2013), pp. 56.
[44] M. Tariq and M. N. A. Khan, "The Context of Global Software Development: Challenges, Best Practices and Benefits", Information Management & Business Review, vol. 3, no. 4, (2011).
[45] A. Shahzad, M. Hussain and M. N. A. Khan, "Protecting from Zero-Day Malware Attacks", Middle-East Journal of Scientific Research, vol. 17, no. 4, (2013), pp. 455-464.
[46] A. A. Khan and M. Khan, "Internet content regulation framework", International Journal of U-& EService, Science & Technology, vol. 4, no. 3, (2011).
[47] K. Ullah and M. N. A. Khan, "Security and Privacy Issues in Cloud Computing Environment: A Survey Paper", International Journal of Grid and Distributed Computing, vol. 7, no. 2, (2014), pp. 89-98.
[48] A. A. Abbasi, M. N. A. Khan and S. A. Khan, "A Critical Survey of Iris Based Recognition Systems", Middle-East Journal of Scientific Research, vol. 15, no. 5, (2013), pp. 663- 668.
[49] M. N. A. Khan, S. A. Qureshi and N. Riaz, "Gender classification with decision trees", Int. J. Signal Process. Image Process. Patt. Recog, vol. 6, (2013), pp. 165-176.
[50] S. S. Ali and M. N. A. Khan, "ICT Infrastructure Framework for Microfinance Institutions and Banks in Pakistan: An Optimized Approach", International Journal of Online Marketing (IJOM), vol. 3, no. 2, (2013), pp. 75-86.
[51] A. Mahmood, M. Ibrahim and M. N. A. Khan, "Service Composition in the Context of Service Oriented Architecture", Middle East Journal of Scientific Research, vol. 15, no. 11, (2013).
[52] M. A. Masood and M. N. A. Khan, "Clustering Techniques in Bioinformatics", I. J. Modern Education and Computer Science, vol. 1, (2015), pp. 38-46.
[53] Ur Rehman, T., Khan, M. N. A., & Riaz, N. (2013). Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies. International Journal of Information Technology and Computer Science (IJITCS), 5(3), 40.
[54] Ahmed, R., & Khan, M. N. A. (2013). An Analytical Review of Stereovision Techniques to Reconstruct 3D Coordinates. International Journal of Information Technology and Computer Science (IJITCS), 5(7), 80.