4GT | Fourth Generation Techniques |
AES | Advanced Encryption Standard |
API | Application Programming Interface |
APF | Adaptive Project Framework |
ACWP | Actual Cost of Work Performed |
AC | Actual Cost |
AHP | Analytical Hierarchy Process |
BBSPI | Blockchain-Based Software Process Improvement |
BSIMM | Building Security in Maturity Model |
BCWS | Budgeted Cost for Work Scheduled |
BTK | Bidirectional Transfer of Knowledge |
BNS | Bi-Normal Separation |
CBDM | Component-Based Development Model |
CMMI | Capability Maturity Model Integration |
CPM | Concurrent Process Model |
CIO | Chief Information Officer |
CPI | Cost Performance Index |
CSF | Critical Success Factors |
CI | Consistency Index |
CR | Consistency Ratio |
CSCM | Cybersecurity Challenges Model |
CSS | Cascading Style Sheets |
CSA | Cyber Security Agency |
DAST | Dynamic Application Security Testing |
DB | Database |
DCM | Divide and Conquer Model |
DevOps | Development and Operations |
DIMM | DevOps Implementation and Management Model |
DC2M | DevOps’ Culture Challenges Model |
DoS | Denial of Service |
DX | Digital Transformation |
EBSE | Evidence-Based Software Engineering |
ESCO | European Skills, Competences and Occupations |
e-CF | e-Competence Framework |
EQF | European Qualifications Framework |
EVM | Earned Value Management |
EV | Earned Value |
ES | Earned Schedule |
FSDM | Formal Systems Development Model |
FP | Function Point |
FTC | Feature Transition Charts |
FPR | False Positive Rate |
GMWD | Generalized Modified Weibull Distribution |
GSD | Global Software Development |
HIPAA | Health Insurance Portability and Accountability Act |
HR | Human Resource |
IAST | Interactive Application Security Testing |
IDC | International Data Corporation |
IDR | Incremental Delivery |
IoT | Internet of Things |
IPs | Improvement Packages |
IT | Information Technology |
ITIL | Information Technology Infrastructure Library |
I/O | Input/Output |
ISO/IEC | International Organization for Standardization/International Electrotechnical Commission |
ISCO | International Standard Classification of Occupations |
ICT | Information and Communications Technology |
KPI | Key Performance Indicators |
KD | Kolmogorov Distance |
LSE | Least Square Estimation |
M&A | Measurement & Analysis |
MM | Maturity Models |
MLE | Maximum Likelihood Estimation |
MSE | Mean Square Error |
MVF | Mean Value Function |
MVC | Model View Controller |
NCS | Non-Cognitive Skills |
NCSF | Non-Cognitive Skills Framework |
NHPP | Non-Homogeneous Poisson Process |
NPS | Net Promoter Scores |
OMG | Object Management Group |
OD-PRM | Open Data Process Reference Model |
OD-CMM | Open Data Capability Maturity Model |
OECD | Organization for Economic Co-operation and Development |
OSS | Open Source Software |
OS | Operating System |
OWASP | Open Web Application Security Project |
OSDO | Offshore Software Development Outsourcing |
P2P | Peer-to-Peer |
PAs | Process Attributes |
PCI DSS | Payment Card Industry Data Security Standard |
P-CMM | People Capability Maturity Model |
PEOU | Perceived Ease of Use |
PIO | Population, Intervention, and Outcome |
PMS | Project Management System |
PU | Perceived Usefulness |
PV | Planned Value |
QA | Quality Assurance |
QFD | Quality Function Deployment |
QoS | Quality of Service |
RAD | Rapid Application Development Model |
ReMo | Recommendation Model |
RQ | Research Questions |
RSA | Rivest-Shamir-Adleman |
RPM | Rapid Prototyping Model |
RFC | Request for Change |
RM | Risk Management |
RI | Random Consistency Index |
SADCM | Software Architecture, Designing Challenges Model |
SAMM | Software Assurance Maturity Model |
SBR | Security Bug Reports |
SCAMPI | Standard CMMI Appraisal Method for Process Improvement |
SGA | Structured Gap Analysis |
SHA | Secure Hash Algorithm |
SLC | Software Life Cycle |
SDL | Security Development Life Cycle |
SDL-Agile | Security Development Life Cycle for Agile Development |
SOA | Service-Oriented Architecture |
SPD | Software Process Definition |
SPEM | Software & Systems Process Engineering Meta-Model |
SPCM | Software Process Certification Model |
SPI | Software Process Improvement |
SPICE | Software Process Improvement and Capability Determination |
SPSS | Statistical Package for Social Sciences |
SQL | Structured Query Language |
SME | Small and Medium Enterprises |
STRIDE | Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege |
SSDL | Software Security Development Life Cycle |
SV | Schedule Variance |
SLR | Systematic Literature Review |
SRGM | Software Reliability Growth Model |
SSE | Sum of Squares Error |
TAM | Technology Acceptance Model |
TAMAR | TMMi Assessment Method Application Requirements |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TIMP | Threat Intelligence Management Platform |
TMMi | Test Maturity Model integration |
TS | Theil’s Statistic |
XP | Extreme Programming |
XSS | Cross-Site Scripting |
XML | Extensible Markup Language |
WBS | Work Breakdown Structure |
WEF | |
WSM | Win-Win Spiral Model |
WAN | Wide Area Network |
WSN | Wireless Sensor Network |
WWW | World Wide Web |