This document discusses how to avoid "reinventing the wheel" when doing research through the use of systematic literature reviews (SLRs). It begins with an introduction to SLRs, explaining their purpose and benefits. The presenter then outlines the steps for conducting an SLR, from forming a research question to evaluating and summarizing results. Examples of SLRs on model-driven security approaches are provided. The document concludes with an exercise where attendees conduct a mock SLR on beers in Luxembourg.
1. How To AVOID “Reinventing The Wheel” in Doing
Research?
From Surveys to Systematic Literature Reviews in CS
Phu H. Nguyen
Interdisciplinary Centre for Security, Reliability and Trust (SnT),
University of Luxembourg,
Luxembourg
2. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 2
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 3
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
4. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 4
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
4. Group Exercise #2
5. Take-Home Message
5. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 5
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
6. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 6
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
7. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 7
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
8. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 8
9. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 9
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
10. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 10
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
11. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 11
1. Group Exercise #1
2. An Introduction to SLR
Outline
12. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 12
What & Why a Systematic Review?
www.replicatedtypo.com
13. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 13
To summarise the existing evidence
concerning a treatment or technology
Why SLR?
To identify any gaps in current research in
order to suggest areas for further
investigation.
To provide a framework/background in order
to appropriately position new research
activities.
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
14. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 14
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
Steps
15. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 15
What make Systematic Literature Reviews
different from normal literature surveys?
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
16. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 16
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
17. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 17
19. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 19
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
20. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 20
Sub-Research Questions
RQ1.1 What kinds of security mechanisms/concerns
are addressed by these MDS approaches?
RQ1.2 How do the MDS approaches specify/model
security requirements together with functional
requirements?
RQ1.3 How model-to-model transformations (MMTs)
are leveraged and which MMT engines are used?
RQ1.4 How model-to-text transformations (MTTs) are
leveraged to generate code, including complete,
configured security infrastructures?
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
21. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 21
Sub-Research Questions
RQ1.5 Have any case studies been performed to
evaluate the approaches? If yes, what results
have been obtained? What other evaluation
methods (other than case studies) have been
applied to evaluate these approaches?
RQ1.6 Which application domains have been
addressed in MDS approaches?
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
22. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 22
RQ3: What are the open issues to be further
investigated?
RQ2: What are the current limitations of each
approach?
23. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 23
( “model-driven” OR “model based” OR
MDA OR MDE OR model* OR UML )
AND ( specify* OR design* )
AND ( transform* OR “code generation” )
AND security
Selection
Criteria
IEEE Xplore ACM Digital Library
ISI Web of Knowledge
Science Direct
Springer
24. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 24
Evaluation Criteria - A Taxonomy of MDS
Security concerns/mechanisms
Modeling approaches
Model-to-model transformations (MMTs)
Model-to-text transformations (MTTs)
Evaluation methods
Application domains
25. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 25
Results
Security concerns addressed by MDS. Why is
Authorization tackled the most?
26. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 26
Aspect-Oriented Modeling vs. Non-AOM
27. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 27
Results
Model-to-model transformations
28. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 28
Results
Model-to-code transformations
29. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 29
Results
Application domains
30. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 30
Results in details.
31. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 31
Primary Approaches
32. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 32
Group Exercise #2: Let’s fake a quick SLR on the
beers being sold in Luxembourg.
(1 Point)
33. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 33
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
4. Group Exercise #2
5. Take-Home Message
34. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 34
35. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 35
• More information? Interested? => our
paper is available!
• Twitter: @nguyenhongphu
The End! Q&A
Editor's Notes
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?
When you give a definition of a property, or a mathematical structure, or some new notation, give examples to show what the definition captures. When you give a theorem, give examples to show what it means in practice.
Ask yourself again and again: “have I illustrated this idea/theorem/definition/technique/algorithm with an example?”.
Just to refer to the table in the paper, no time spent here!
RQ3: What are the open issues to be further investigated?
RQ3: What are the open issues to be further investigated?