A method framework for identifying digital resource clusters in software ecosystems

Decision Support Systems - Trang 114085 - 2023
Martin Kang1, Gary F. Templeton2, Euntae Ted Lee3, Sungyong Um4
1Loyola Marymount University, 1 Loyola Marymount University Dr, Los Angeles, CA 90045, United States of America
2West Virginia University, Morgantown, WV 26506, United States of America
3The University of Memphis, Memphis, TN 38152, United States of America
4Hanyang University, 55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea

Tài liệu tham khảo

Manikas, 2016, Revisiting software ecosystems research: a longitudinal literature study, J. Syst. Softw., 117, 84, 10.1016/j.jss.2016.02.003 Decan, 2019, An empirical comparison of dependency network evolution in seven software packaging ecosystems, Empir. Softw. Eng., 24, 381, 10.1007/s10664-017-9589-y Kikas, 2017, 102 F. Zandt, How Big Tech Contributes to Open Source, (n.d.). https://www.statista.com/chart/25795/active-github-contributors-by-employer/. Um, 2023 Henfridsson, 2018, Recombination in the open-ended value landscape of digital innovation, Inf. Organ., 28, 89, 10.1016/j.infoandorg.2018.03.001 A. Luttwak, Log4Shell 10 Days Later: Enterprises Halfway through Patching, (n.d.). https://www.wiz.io/blog/10-days-later-enterprises-halfway-through-patching-log4shell. Microsoft Threat intelligence, Guidance for Preventing, Detecting, and Hunting for Exploitation of the Log4j 2 Vulnerability, (n.d.). https://www.microsoft.com/en-us/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/. I. Ilascu, Log4j: List of Vulnerable Products and Vendor Advisories, (n.d.). https://www.bleepingcomputer.com/news/security/log4j-list-of-vulnerable-products-and-vendor-advisories/. Datta, 2020, Understanding the relation between repeat developer interactions and bug resolution times in large open source ecosystems: A multisystem study, J. Software: Evolut. Proc., e2317 Hanssen, 2012, A longitudinal case study of an emerging software ecosystem: implications for practice and theory, J. Syst. Softw., 85, 1455, 10.1016/j.jss.2011.04.020 Baldwin, 2014, Hidden structure: using network methods to map system architecture, Res. Policy, 43, 1381, 10.1016/j.respol.2014.05.004 MacCormack, 2006, Exploring the structure of complex software designs: An empirical study of open source and proprietary code, Manag. Sci., 52, 1015, 10.1287/mnsc.1060.0552 Blincoe, 2019, Reference coupling: An exploration of inter-project technical dependencies and their characteristics within large software ecosystems, Inf. Softw. Technol., 110, 174, 10.1016/j.infsof.2019.03.005 Hou, 2021, Community detection in software ecosystem by comprehensively evaluating developer cooperation intensity, Inf. Softw. Technol., 130, 106451, 10.1016/j.infsof.2020.106451 Wareham, 2014, Technology ecosystem governance, Organ. Sci., 25, 1195, 10.1287/orsc.2014.0895 Dittrich, 2014, Software engineering beyond the project–sustaining software ecosystems, Inf. Softw. Technol., 56, 1436, 10.1016/j.infsof.2014.02.012 Liu, 2020 Sun, 2020, Network embedding for community detection in attributed networks, 14, 1 Wu, 2020, Deep learning techniques for community detection in social networks, IEEE Access., 8, 96016, 10.1109/ACCESS.2020.2996001 Dong, 2017, metapath2vec: Scalable representation learning for heterogeneous networks, 135 Ribeiro, 2017, struc2vec: Learning node representations from structural identity, 385 Grover, 2016, node2vec: Scalable feature learning for networks, 855 Ankerst, 1999, OPTICS: ordering points to identify the clustering structure, ACM SIGMOD Rec., 28, 49, 10.1145/304181.304187 Agrawal, 2016, Development and validation of OPTICS based spatio-temporal clustering technique, Inf. Sci., 369, 388, 10.1016/j.ins.2016.06.048 Eaton, 2015, Distributed tuning of boundary resources: the case of Apple’s iOS service system, MIS Quart. Manag. Inform. Syst., 39, 217, 10.25300/MISQ/2015/39.1.10 Hein, 2020, Digital platform ecosystems, Electron. Mark., 30, 87, 10.1007/s12525-019-00377-4 Sears, 2014, Technological overlap, technological capabilities, and resource recombination in technological acquisitions, Strateg. Manag. J., 35, 48, 10.1002/smj.2083 Crowston, 2008, Free/libre open-source software development: what we know and what we do not know, ACM Comp. Surveys (CSUR)., 44, 1 Scacchi, 2007, Free/open source software development: recent research results and methods, Adv. Comput., 69, 243, 10.1016/S0065-2458(06)69005-0 Toral, 2010, Analysis of virtual communities supporting OSS projects using social network analysis, Inf. Softw. Technol., 52, 296, 10.1016/j.infsof.2009.10.007 Zhou, 2011, Understanding online community user participation: a social influence perspective, Internet Res, 21, 67, 10.1108/10662241111104884 Wang, 2018, Copycats vs. original mobile apps: A machine learning copycat-detection method and empirical analysis, Information Systems Research., 29, 273, 10.1287/isre.2017.0735 Wang, 2018, Understanding blockchain technology for future supply chains: a systematic literature review and research agenda, Supply Chain Manag. Int. J., 24, 62, 10.1108/SCM-03-2018-0148 Teixeira, 2015, Lessons learned from applying social network analysis on an industrial free/libre/open source software ecosystem, J. Internet Serv. Appl., 6, 1, 10.1186/s13174-015-0028-2 Grossman, 2005, Does UML make the grade? Insights from the software development community, Inf. Softw. Technol., 47, 383, 10.1016/j.infsof.2004.09.005 Stolee, 2013, Discovering how end-user programmers and their communities use public repositories: a study on yahoo! Pipes, Inf. Softw. Technol., 55, 1289, 10.1016/j.infsof.2012.10.004 Füller, 2014, User roles and contributions in innovation-contest communities, J. Manag. Inf. Syst., 31, 273, 10.2753/MIS0742-1222310111 Martínez-Torres, 2014, Analysis of open innovation communities from the perspective of social network analysis, Tech. Anal. Strat. Manag., 26, 435, 10.1080/09537325.2013.851378 Sosa, 2011, Degree distribution and quality in complex engineered systems, J. Mech. Des., 133, 10.1115/1.4004973 Cui, 2018, A survey on network embedding, IEEE Trans. Knowl. Data Eng., 31, 833, 10.1109/TKDE.2018.2849727 Liu, 2021, Policy learning with constraints in model-free reinforcement learning: A Survey, IJCAI, 4508 Ma, 2021, A comprehensive survey on graph anomaly detection with deep learning Ding, 2019, Interactive anomaly detection on attributed networks, 357 Aggarwal, 2014, A framework for dynamic link prediction in heterogeneous networks, Stat. Anal. Data Min. ASA Data Sci. J., 7, 14, 10.1002/sam.11198 Symeonidis, 2013, From biological to social networks: link prediction based on multi-way spectral clustering, Data Knowl. Eng., 87, 226, 10.1016/j.datak.2013.05.008 Goyal, 2018, Graph embedding techniques, applications, and performance: a survey, Knowl.-Based Syst., 151, 78, 10.1016/j.knosys.2018.03.022 Roweis, 2000, Nonlinear dimensionality reduction by locally linear embedding, Science., 290, 2323, 10.1126/science.290.5500.2323 Perozzi, 2014, Deepwalk: Online learning of social representations, 701 Schmidhuber, 2015, Deep learning in neural networks: An overview, Neural Netw., 61, 85, 10.1016/j.neunet.2014.09.003 Chiang, 2019, Cluster-gcn: An efficient algorithm for training deep and large graph convolutional networks, 257 Zhao, 2019, T-gcn: a temporal graph convolutional network for traffic prediction, IEEE Trans. Intell. Transp. Syst., 21, 3848, 10.1109/TITS.2019.2935152 Kaufman, 2009 Ng, 1994, E cient and E ective clustering methods for spatial data mining, 144 Baboo, 2013, Clustering centroid finding algorithm (CCFA) using spatial temporal data mining concept, 30 Garg, 2006, Variation of k-mean algorithm: a study for high-dimensional large data set, Inf. Technol. J., 5, 1132, 10.3923/itj.2006.1132.1135 Garg, 2007, A heuristic based variation of K-mean clustering algorithm for dealing with outlier, IJCSE., 4, 56 Zhang, 1996, BIRCH: an efficient data clustering method for very large databases, ACM SIGMOD Rec., 25, 103, 10.1145/235968.233324 Guha, 1998, CURE: An efficient clustering algorithm for large databases, ACM SIGMOD Rec., 27, 73, 10.1145/276305.276312 Lee, 2005, Unsupervised multistage image classification using hierarchical clustering with a Bayesian similarity measure, IEEE Trans. Image Process., 14, 312, 10.1109/TIP.2004.841195 Campello, 2013, Density-based clustering based on hierarchical density estimates, 160 Nagpal, 2011, Comparative study of density based clustering algorithms, Int. J. Comput. Appl., 27, 421 Ester, 1996, A density-based algorithm for discovering clusters in large spatial databases with noise, 226 Birant, 2007, ST-DBSCAN: An algorithm for clustering spatial–temporal data, Data Knowl. Eng., 60, 208, 10.1016/j.datak.2006.01.013 Mikolov, 2013 De Winter, 2018, 1234 Du, 2018, 2086 Nguyen, 2018, Dynamic network embeddings: From random walks to temporal random walks, 1085 Manikas, 2013, Software ecosystems–a systematic literature review, J. Syst. Softw., 86, 1294, 10.1016/j.jss.2012.12.026 Sun, 2011, Pathsim: Meta path-based top-k similarity search in heterogeneous information networks, Proc. VLDB Endowment., 4, 992, 10.14778/3402707.3402736 Dong, 2015, Coupledlp: Link prediction in coupled networks, 199 Sun, 2013, Pathselclus: integrating meta-path selection with user-guided object clustering in heterogeneous information networks, ACM Transactions on Knowledge Discovery from Data (TKDD)., 7, 1, 10.1145/2500492 Sun, 2012, Mining heterogeneous information networks: principles and methodologies, Synth. Lectures Data Min. Knowledge Disc., 3, 1, 10.1007/978-3-031-01902-9 Jin, 2020, How does weight correlation affect generalisation ability of deep neural networks?, Adv. Neural Inf. Proces. Syst., 33, 21346 Pernice, 2011, How structure determines correlations in neuronal networks, PLoS Comput. Biol., 7, 10.1371/journal.pcbi.1002059 Li, 2017, 1232 Mahdavi, 2018, 3762 Wu, 2020, A comprehensive survey on graph neural networks Desgraupes, 2013, Clustering indices, Univ. Paris Ouest-Lab Modal’X., 1, 34 Wang, 2007, On fuzzy cluster validity indices, Fuzzy Sets Syst., 158, 2095, 10.1016/j.fss.2007.03.004 Langfelder, 2008, WGCNA: an R package for weighted correlation network analysis, BMC Bioinform., 9, 1, 10.1186/1471-2105-9-559 Danilovic, 2007, Managing complex product development projects with design structure matrices and domain mapping matrices, Int. J. Proj. Manag., 25, 300, 10.1016/j.ijproman.2006.11.003 Huang, 2022, A graph entropy measure from urelement to higher-order graphlets for network analysis Dodd, 2003, Partial AUC estimation and regression, Biometrics., 59, 614, 10.1111/1541-0420.00071 Son, 2019, Understanding the uncertainty of disaster tweets and its effect on retweeting: the perspectives of uncertainty reduction theory and information entropy, J. Assoc. Inf. Sci. Technol., 71, 1145, 10.1002/asi.24329 Kang, 2022, Development of methods for identifying an appropriate benchmarking peer to establish information security policy, Expert Syst. Appl., 201, 117028, 10.1016/j.eswa.2022.117028