SlideShare a Scribd company logo
1 of 35
How To AVOID “Reinventing The Wheel” in Doing
Research?
From Surveys to Systematic Literature Reviews in CS
Phu H. Nguyen
Interdisciplinary Centre for Security, Reliability and Trust (SnT),
University of Luxembourg,
Luxembourg
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 2
1. Group Exercise #1
2. An Introduction to SLR
Outline
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 3
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 4
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
4. Group Exercise #2
5. Take-Home Message
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 5
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 6
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 7
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 8
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 9
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 10
Group Exercise #1: Find the common parts in
the outlines of PhD theses. (1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 11
1. Group Exercise #1
2. An Introduction to SLR
Outline
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 12
What & Why a Systematic Review?
www.replicatedtypo.com
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 13
To summarise the existing evidence
concerning a treatment or technology
Why SLR?
To identify any gaps in current research in
order to suggest areas for further
investigation.
To provide a framework/background in order
to appropriately position new research
activities.
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 14
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
Steps
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 15
What make Systematic Literature Reviews
different from normal literature surveys?
Keele Uni’s Staffs. Guidelines for performing systematic
literature reviews in software engineering. Technical
report, EBSE Technical Report EBSE-2007-01, 2007.
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 16
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 17
Article (Fernandez-Medina2009)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 19
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 20
Sub-Research Questions
RQ1.1 What kinds of security mechanisms/concerns
are addressed by these MDS approaches?
RQ1.2 How do the MDS approaches specify/model
security requirements together with functional
requirements?
RQ1.3 How model-to-model transformations (MMTs)
are leveraged and which MMT engines are used?
RQ1.4 How model-to-text transformations (MTTs) are
leveraged to generate code, including complete,
configured security infrastructures?
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 21
Sub-Research Questions
RQ1.5 Have any case studies been performed to
evaluate the approaches? If yes, what results
have been obtained? What other evaluation
methods (other than case studies) have been
applied to evaluate these approaches?
RQ1.6 Which application domains have been
addressed in MDS approaches?
Research Question (RQ) 1: How are the existing
MDS approaches supporting the development
of secure systems?
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 22
RQ3: What are the open issues to be further
investigated?
RQ2: What are the current limitations of each
approach?
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 23
( “model-driven” OR “model based” OR
MDA OR MDE OR model* OR UML )
AND ( specify* OR design* )
AND ( transform* OR “code generation” )
AND security
Selection
Criteria
IEEE Xplore ACM Digital Library
ISI Web of Knowledge
Science Direct
Springer
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 24
Evaluation Criteria - A Taxonomy of MDS
Security concerns/mechanisms
Modeling approaches
Model-to-model transformations (MMTs)
Model-to-text transformations (MTTs)
Evaluation methods
Application domains
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 25
Results
Security concerns addressed by MDS. Why is
Authorization tackled the most?
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 26
Aspect-Oriented Modeling vs. Non-AOM
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 27
Results
Model-to-model transformations
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 28
Results
Model-to-code transformations
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 29
Results
Application domains
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 30
Results in details.
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 31
Primary Approaches
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 32
Group Exercise #2: Let’s fake a quick SLR on the
beers being sold in Luxembourg.
(1 Point)
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 33
1. Group Exercise #1
2. An Introduction to SLR
Outline
3. Doing a SLR: From A to Z
4. Group Exercise #2
5. Take-Home Message
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 34
ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 35
• More information? Interested? => our
paper is available!
• Twitter: @nguyenhongphu
The End! Q&A

More Related Content

Viewers also liked

Re-defINING HUMAN FACTOR IN DEBT COLLECTION - Ayşe Burcu Arslan
Re-defINING HUMAN FACTOR IN DEBT COLLECTION  - Ayşe Burcu ArslanRe-defINING HUMAN FACTOR IN DEBT COLLECTION  - Ayşe Burcu Arslan
Re-defINING HUMAN FACTOR IN DEBT COLLECTION - Ayşe Burcu ArslanLászló Árvai
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityPhu H. Nguyen
 
GR Heights - ft2acres.com
GR Heights -  ft2acres.comGR Heights -  ft2acres.com
GR Heights - ft2acres.comKin Housing
 
Make or Buy IT Decision
Make or Buy IT DecisionMake or Buy IT Decision
Make or Buy IT DecisionUmesh Bajaj
 
Il Mercato Televisivo Digitale Multipiattaforma
Il Mercato Televisivo Digitale MultipiattaformaIl Mercato Televisivo Digitale Multipiattaforma
Il Mercato Televisivo Digitale MultipiattaformaHibo
 
In-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy DecisionIn-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy DecisionContinuous Computing
 
Build vs Buy Strategy
Build vs Buy StrategyBuild vs Buy Strategy
Build vs Buy StrategyChris Halton
 
Comparing In-House vs Outsourced IT Services
Comparing In-House vs Outsourced IT ServicesComparing In-House vs Outsourced IT Services
Comparing In-House vs Outsourced IT ServicesSolution Systems, Inc.
 
Full Study - Digital Roadblock: Marketers Struggle to Reinvent Themselves
Full Study - Digital Roadblock: Marketers Struggle to Reinvent ThemselvesFull Study - Digital Roadblock: Marketers Struggle to Reinvent Themselves
Full Study - Digital Roadblock: Marketers Struggle to Reinvent ThemselvesAdobe
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingAnkit
 

Viewers also liked (13)

Re-defINING HUMAN FACTOR IN DEBT COLLECTION - Ayşe Burcu Arslan
Re-defINING HUMAN FACTOR IN DEBT COLLECTION  - Ayşe Burcu ArslanRe-defINING HUMAN FACTOR IN DEBT COLLECTION  - Ayşe Burcu Arslan
Re-defINING HUMAN FACTOR IN DEBT COLLECTION - Ayşe Burcu Arslan
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven Security
 
GR Heights - ft2acres.com
GR Heights -  ft2acres.comGR Heights -  ft2acres.com
GR Heights - ft2acres.com
 
Make or Buy IT Decision
Make or Buy IT DecisionMake or Buy IT Decision
Make or Buy IT Decision
 
In House HR
In House HRIn House HR
In House HR
 
Il Mercato Televisivo Digitale Multipiattaforma
Il Mercato Televisivo Digitale MultipiattaformaIl Mercato Televisivo Digitale Multipiattaforma
Il Mercato Televisivo Digitale Multipiattaforma
 
Slide Make or buy
Slide Make or buySlide Make or buy
Slide Make or buy
 
In-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy DecisionIn-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy Decision
 
Build vs Buy Strategy
Build vs Buy StrategyBuild vs Buy Strategy
Build vs Buy Strategy
 
Comparing In-House vs Outsourced IT Services
Comparing In-House vs Outsourced IT ServicesComparing In-House vs Outsourced IT Services
Comparing In-House vs Outsourced IT Services
 
Full Study - Digital Roadblock: Marketers Struggle to Reinvent Themselves
Full Study - Digital Roadblock: Marketers Struggle to Reinvent ThemselvesFull Study - Digital Roadblock: Marketers Struggle to Reinvent Themselves
Full Study - Digital Roadblock: Marketers Struggle to Reinvent Themselves
 
Make or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcingMake or buy, insourcingoutsourcing
Make or buy, insourcingoutsourcing
 
Make or buy diagram
Make or buy diagramMake or buy diagram
Make or buy diagram
 

Similar to How to Avoid Reinventing the Wheel in Research

Model-Driven Security with Modularity and Reusability for Engineering Secure ...
Model-Driven Security with Modularity and Reusability for Engineering Secure ...Model-Driven Security with Modularity and Reusability for Engineering Secure ...
Model-Driven Security with Modularity and Reusability for Engineering Secure ...Phu H. Nguyen
 
Simulation: From theory to implementation
Simulation: From theory to implementationSimulation: From theory to implementation
Simulation: From theory to implementationAdam Dubrowski
 
Integrating Sustainability and Project Management
Integrating Sustainability and Project ManagementIntegrating Sustainability and Project Management
Integrating Sustainability and Project ManagementLuca Sabini
 
Paper sharing_Tapping into the wearable device revolution in the work environ...
Paper sharing_Tapping into the wearable device revolution in the work environ...Paper sharing_Tapping into the wearable device revolution in the work environ...
Paper sharing_Tapping into the wearable device revolution in the work environ...YOU SHENG CHEN
 
COBI 2014 - Designing a Meta Model as the Foundation for Compliance Capability
COBI 2014 - Designing a Meta Model as the Foundation for Compliance CapabilityCOBI 2014 - Designing a Meta Model as the Foundation for Compliance Capability
COBI 2014 - Designing a Meta Model as the Foundation for Compliance CapabilityCaaS EU FP7 Project
 
Journal Club - Best Practices for Scientific Computing
Journal Club - Best Practices for Scientific ComputingJournal Club - Best Practices for Scientific Computing
Journal Club - Best Practices for Scientific ComputingBram Zandbelt
 
Theories in Empirical Software Engineering
Theories in Empirical Software EngineeringTheories in Empirical Software Engineering
Theories in Empirical Software EngineeringDaniel Mendez
 
Min-Yen Kan - 2015 - Keywords, phrases, clauses and sentences: topicality, i...
Min-Yen Kan - 2015 -  Keywords, phrases, clauses and sentences: topicality, i...Min-Yen Kan - 2015 -  Keywords, phrases, clauses and sentences: topicality, i...
Min-Yen Kan - 2015 - Keywords, phrases, clauses and sentences: topicality, i...Association for Computational Linguistics
 
Research designs for quantitative studies ppt
Research designs for quantitative studies  pptResearch designs for quantitative studies  ppt
Research designs for quantitative studies pptNursing Path
 
Data Sets as Facilitator for new Products and Services for Universities
Data Sets as Facilitator for new Products and Services for UniversitiesData Sets as Facilitator for new Products and Services for Universities
Data Sets as Facilitator for new Products and Services for UniversitiesHendrik Drachsler
 
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...Thomas Hildebrandt
 
Research designs in social science by vinay
Research designs in social science by vinayResearch designs in social science by vinay
Research designs in social science by vinayVinay Kumar
 
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)Michael Derntl
 
Open Science Framework (OSF): Presentation and Training
Open Science Framework (OSF): Presentation and TrainingOpen Science Framework (OSF): Presentation and Training
Open Science Framework (OSF): Presentation and TrainingAndrew Sallans
 
Lean thinking literature review and suggestions for future research
Lean thinking literature review and suggestions for future researchLean thinking literature review and suggestions for future research
Lean thinking literature review and suggestions for future researchWorld-Academic Journal
 

Similar to How to Avoid Reinventing the Wheel in Research (20)

Model-Driven Security with Modularity and Reusability for Engineering Secure ...
Model-Driven Security with Modularity and Reusability for Engineering Secure ...Model-Driven Security with Modularity and Reusability for Engineering Secure ...
Model-Driven Security with Modularity and Reusability for Engineering Secure ...
 
Lect1 intro-cs-research
Lect1 intro-cs-researchLect1 intro-cs-research
Lect1 intro-cs-research
 
Simulation: From theory to implementation
Simulation: From theory to implementationSimulation: From theory to implementation
Simulation: From theory to implementation
 
Integrating Sustainability and Project Management
Integrating Sustainability and Project ManagementIntegrating Sustainability and Project Management
Integrating Sustainability and Project Management
 
Paper sharing_Tapping into the wearable device revolution in the work environ...
Paper sharing_Tapping into the wearable device revolution in the work environ...Paper sharing_Tapping into the wearable device revolution in the work environ...
Paper sharing_Tapping into the wearable device revolution in the work environ...
 
COBI 2014 - Designing a Meta Model as the Foundation for Compliance Capability
COBI 2014 - Designing a Meta Model as the Foundation for Compliance CapabilityCOBI 2014 - Designing a Meta Model as the Foundation for Compliance Capability
COBI 2014 - Designing a Meta Model as the Foundation for Compliance Capability
 
Journal Club - Best Practices for Scientific Computing
Journal Club - Best Practices for Scientific ComputingJournal Club - Best Practices for Scientific Computing
Journal Club - Best Practices for Scientific Computing
 
Theories in Empirical Software Engineering
Theories in Empirical Software EngineeringTheories in Empirical Software Engineering
Theories in Empirical Software Engineering
 
Min-Yen Kan - 2015 - Keywords, phrases, clauses and sentences: topicality, i...
Min-Yen Kan - 2015 -  Keywords, phrases, clauses and sentences: topicality, i...Min-Yen Kan - 2015 -  Keywords, phrases, clauses and sentences: topicality, i...
Min-Yen Kan - 2015 - Keywords, phrases, clauses and sentences: topicality, i...
 
Research designs for quantitative studies ppt
Research designs for quantitative studies  pptResearch designs for quantitative studies  ppt
Research designs for quantitative studies ppt
 
Data Sets as Facilitator for new Products and Services for Universities
Data Sets as Facilitator for new Products and Services for UniversitiesData Sets as Facilitator for new Products and Services for Universities
Data Sets as Facilitator for new Products and Services for Universities
 
Opponents' questions from doctoral defense of Yue Dai
Opponents' questions from doctoral defense of Yue DaiOpponents' questions from doctoral defense of Yue Dai
Opponents' questions from doctoral defense of Yue Dai
 
System Adoption: Socio-Technical Integration
System Adoption: Socio-Technical IntegrationSystem Adoption: Socio-Technical Integration
System Adoption: Socio-Technical Integration
 
Operations Research
Operations ResearchOperations Research
Operations Research
 
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...
A Case for Declarative Process Modelling - Slides on Adaptive Case Managment ...
 
Research designs in social science by vinay
Research designs in social science by vinayResearch designs in social science by vinay
Research designs in social science by vinay
 
Research design
Research designResearch design
Research design
 
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)
Basics of Paper Writing and Publishing in TEL (JTEL 2014 Workshop)
 
Open Science Framework (OSF): Presentation and Training
Open Science Framework (OSF): Presentation and TrainingOpen Science Framework (OSF): Presentation and Training
Open Science Framework (OSF): Presentation and Training
 
Lean thinking literature review and suggestions for future research
Lean thinking literature review and suggestions for future researchLean thinking literature review and suggestions for future research
Lean thinking literature review and suggestions for future research
 

More from Phu H. Nguyen

The Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondThe Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondPhu H. Nguyen
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Phu H. Nguyen
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorPhu H. Nguyen
 
Software Engineering Research @ Simula
Software Engineering Research @ SimulaSoftware Engineering Research @ Simula
Software Engineering Research @ SimulaPhu H. Nguyen
 
Master Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentMaster Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentPhu H. Nguyen
 
Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Phu H. Nguyen
 
SoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsSoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsPhu H. Nguyen
 
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...Phu H. Nguyen
 
Model-Driven Adaptive Delegation
Model-Driven Adaptive DelegationModel-Driven Adaptive Delegation
Model-Driven Adaptive DelegationPhu H. Nguyen
 
Testing Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisTesting Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisPhu H. Nguyen
 
Stay young, keep sharing, learning, and playing with SPA - SnT PhD Association
Stay young, keep sharing, learning, and playing with SPA - SnT PhD AssociationStay young, keep sharing, learning, and playing with SPA - SnT PhD Association
Stay young, keep sharing, learning, and playing with SPA - SnT PhD AssociationPhu H. Nguyen
 

More from Phu H. Nguyen (11)

The Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondThe Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respond
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sector
 
Software Engineering Research @ Simula
Software Engineering Research @ SimulaSoftware Engineering Research @ Simula
Software Engineering Research @ Simula
 
Master Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentMaster Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering Department
 
Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015
 
SoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsSoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure Systems
 
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...
A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Kara...
 
Model-Driven Adaptive Delegation
Model-Driven Adaptive DelegationModel-Driven Adaptive Delegation
Model-Driven Adaptive Delegation
 
Testing Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisTesting Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation Analysis
 
Stay young, keep sharing, learning, and playing with SPA - SnT PhD Association
Stay young, keep sharing, learning, and playing with SPA - SnT PhD AssociationStay young, keep sharing, learning, and playing with SPA - SnT PhD Association
Stay young, keep sharing, learning, and playing with SPA - SnT PhD Association
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

How to Avoid Reinventing the Wheel in Research

  • 1. How To AVOID “Reinventing The Wheel” in Doing Research? From Surveys to Systematic Literature Reviews in CS Phu H. Nguyen Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg
  • 2. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 2 1. Group Exercise #1 2. An Introduction to SLR Outline
  • 3. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 3 1. Group Exercise #1 2. An Introduction to SLR Outline 3. Doing a SLR: From A to Z
  • 4. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 4 1. Group Exercise #1 2. An Introduction to SLR Outline 3. Doing a SLR: From A to Z 4. Group Exercise #2 5. Take-Home Message
  • 5. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 5 Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)
  • 6. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 6 Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)
  • 7. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 7 Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)
  • 8. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 8
  • 9. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 9 Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)
  • 10. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 10 Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)
  • 11. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 11 1. Group Exercise #1 2. An Introduction to SLR Outline
  • 12. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 12 What & Why a Systematic Review? www.replicatedtypo.com
  • 13. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 13 To summarise the existing evidence concerning a treatment or technology Why SLR? To identify any gaps in current research in order to suggest areas for further investigation. To provide a framework/background in order to appropriately position new research activities. Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007.
  • 14. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 14 Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007. Steps
  • 15. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 15 What make Systematic Literature Reviews different from normal literature surveys? Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007.
  • 16. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 16 1. Group Exercise #1 2. An Introduction to SLR Outline 3. Doing a SLR: From A to Z
  • 17. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 17
  • 19. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 19 Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?
  • 20. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 20 Sub-Research Questions RQ1.1 What kinds of security mechanisms/concerns are addressed by these MDS approaches? RQ1.2 How do the MDS approaches specify/model security requirements together with functional requirements? RQ1.3 How model-to-model transformations (MMTs) are leveraged and which MMT engines are used? RQ1.4 How model-to-text transformations (MTTs) are leveraged to generate code, including complete, configured security infrastructures? Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?
  • 21. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 21 Sub-Research Questions RQ1.5 Have any case studies been performed to evaluate the approaches? If yes, what results have been obtained? What other evaluation methods (other than case studies) have been applied to evaluate these approaches? RQ1.6 Which application domains have been addressed in MDS approaches? Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?
  • 22. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 22 RQ3: What are the open issues to be further investigated? RQ2: What are the current limitations of each approach?
  • 23. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 23 ( “model-driven” OR “model based” OR MDA OR MDE OR model* OR UML ) AND ( specify* OR design* ) AND ( transform* OR “code generation” ) AND security Selection Criteria IEEE Xplore ACM Digital Library ISI Web of Knowledge Science Direct Springer
  • 24. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 24 Evaluation Criteria - A Taxonomy of MDS Security concerns/mechanisms Modeling approaches Model-to-model transformations (MMTs) Model-to-text transformations (MTTs) Evaluation methods Application domains
  • 25. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 25 Results Security concerns addressed by MDS. Why is Authorization tackled the most?
  • 26. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 26 Aspect-Oriented Modeling vs. Non-AOM
  • 27. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 27 Results Model-to-model transformations
  • 28. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 28 Results Model-to-code transformations
  • 29. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 29 Results Application domains
  • 30. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 30 Results in details.
  • 31. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 31 Primary Approaches
  • 32. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 32 Group Exercise #2: Let’s fake a quick SLR on the beers being sold in Luxembourg. (1 Point)
  • 33. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 33 1. Group Exercise #1 2. An Introduction to SLR Outline 3. Doing a SLR: From A to Z 4. Group Exercise #2 5. Take-Home Message
  • 34. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 34
  • 35. ICTSS 2010How To AVOID “Reinventing The Wheel” in Research?Phu H. Nguyen 35 • More information? Interested? => our paper is available! • Twitter: @nguyenhongphu The End! Q&A

Editor's Notes

  1. RQ3: What are the open issues to be further investigated?
  2. RQ3: What are the open issues to be further investigated?
  3. RQ3: What are the open issues to be further investigated?
  4. RQ3: What are the open issues to be further investigated?
  5. RQ3: What are the open issues to be further investigated?
  6. RQ3: What are the open issues to be further investigated?
  7. RQ3: What are the open issues to be further investigated?
  8. RQ3: What are the open issues to be further investigated?
  9. RQ3: What are the open issues to be further investigated?
  10. RQ3: What are the open issues to be further investigated?
  11. RQ3: What are the open issues to be further investigated?
  12. RQ3: What are the open issues to be further investigated?
  13. RQ3: What are the open issues to be further investigated?
  14. RQ3: What are the open issues to be further investigated?
  15. When you give a definition of a property, or a mathematical structure, or some new notation, give examples to show what the definition captures. When you give a theorem, give examples to show what it means in practice. Ask yourself again and again: “have I illustrated this idea/theorem/definition/technique/algorithm with an example?”.
  16. Just to refer to the table in the paper, no time spent here!
  17. RQ3: What are the open issues to be further investigated?
  18. RQ3: What are the open issues to be further investigated?