Implementing Project Management Category Process Areas of CMMI Version 1.3 Using Scrum Practices, and Assets
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Software development organizations that rely on Capability Maturity Model Integration (CMMI) to assess and improve their processes have realized that agile approaches can provide improvements as well. CMMI and agile methods can work well together and exploit synergies that have the potential to improve dramatically business performance. The major question is: How to realize the integration of these two seemingly different approaches? In an earlier work, we have conducted a field study within six companies. These companies worked with agile methods for years and the Egyptian Software Engineering Competence Center (SECC), which is the regional CMMI appraisal center, assessed them. This study was mainly conducted to enhance the empirical understanding in this research field. Additionally, it showed that companies usually don’t use agile in a good way that helps in covering the CMMI specific practices. In this paper, we present a new approach for mapping between CMMI and Scrum method. This mapping has been analyzed, enhanced, and then applied to the same companies. Putting in considerations that other previous efforts have worked in the same context but for an older version of CMMI, our research is using the latest CMMI version, which is 1.3. The research shows that our mapping approach has resulted in 37% satisfaction and achieved 17% partial satisfaction for CMMI specific practices. This resembles 19.4% enhancement in the satisfaction, and 6.2% improvement in the partial satisfaction against the previous related research effort that was already not targeting the latest CMMI version.
Authors and Affiliations
Ahmed Farid, A. Elghany, Yehia Helmy
RKE-CP: Response-based Knowledge Extraction from Collaborative Platform of Text-based Communication
With the generation of massive amount of product-centric responses from existing applications on collaborative platform, it is necessary to perform a discrete analytical operation on it. As majority of such responses are...
Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005
Universities in the public and private sectors depend on information technology and information systems to successfully carry out their missions and business functions. Information systems are subject to serious threats...
Investigating Social Media Utilization and Challenges in the Governmental Sector for Crisis Events
The use and utilization of social media applications, tools, and services enables advanced services in daily routines, activities, and work environments. Nowadays, disconnection from social media services is a disadvanta...
Optimization Query Process of Mediators Interrogation Based On Combinatorial Storage
In the distributed environment where a query involves several heterogeneous sources, communication costs must be taken into consideration. In this paper we describe a query optimization approach using dynamic programming...
Strength of Crypto-Semantic System of Tabular Data Protection
The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres...