I am a Professor in Software Engineering at the School of Informatics, Aristotle University of Thessaloniki. My research is around Open Source Software, Software Project Management and Enterprise Information Systems.
The main aim of this pilot study is to investigate management anti-patterns encountered in IT inn... more The main aim of this pilot study is to investigate management anti-patterns encountered in IT innovation projects, in the long run. A quantitative research methodology was chosen. A group of software project managers in industrial innovation projects were requested to fill in a questionnaire. The collected data revealed anti-patterns, which were compared and contrasted to the anti-patterns mostly found in traditional software projects. Some anti-patterns encountered in conventional software projects were also identified in innovation projects. Additionally, a new possible anti-pattern was identified and further investigated. The new anti-pattern regards the management of team creativity and is considered as an anti-pattern, because it can be an obstacle in teamwork progress, having negative consequences. A remedy solution is recommended as a re-factoring and recovering management strategy. Overall, this pilot study offers a set of practical guidelines for project managers, and innovation project managers in particular; this is a current IT management need that must be addressed in the near future. Further, there is a gap of relevant knowledge in the field and there are no similar studies regarding software project management anti-patterns in innovation projects in the literature. Therefore, this work could be considered as the first ever pilot research study, which investigates and reports on anti-patterns in innovation projects. Finally, we mention our future plans and outline how this initial data gathering can be useful for constructing a research project to find out more on the above research needs and IT development metarequirements.
Blockchain technology back in 2009 was mainly used for finance use cases due to the cryptocurrenc... more Blockchain technology back in 2009 was mainly used for finance use cases due to the cryptocurrency support of the Bitcoin and the Ethereum networks. Nowadays with the emergence of business oriented distributed ledger frameworks we can find blockchain (BC) in almost every aspect of our everyday real-life transactions. Starting with supply chain, BC has been used to support and secure education, e-government, real estate, insurance, healthcare and other business cases. Regarding blockchain in supply chain, examples as the Walmart and IBM partnership shows that smart contracts (SC) and cryptocurrencies can disrupt the way suppliers, shippers, retailers and customers trust each other and interact. This paper describes how we applied BC technology in two real-life supply chain scenarios. The first one is for logging and tracing products, showing how we can use SCs to identify the ingredients of food products and how to uniquely identify the food product throughout its shipment from the factory to the customer who purchase it. Important aspects of this route is the transparency of the process as well as the verification of transport. The second one deals with how authentication works for users holding BC identities. The identity of a user is important in order to secure the network, allowing only permissioned parties to access it and perform actions on the data. As long as the network is private and immutable, authenticating and authorizing users is crucial for enforcing the end-to-end security to increase users' trust and protect the confidentiality of data. While exploring these two scenarios we define the actors, the transactions these actors can perform on the systems and we propose the SCs that have to be implemented for these use cases to take advantage of BC's unique characteristics, as immutability and non-repudiation. In addition, we provide sample template SCs for both scenarios.
Before initiating a Business Process Re-engineering and Business Process Automation project an or... more Before initiating a Business Process Re-engineering and Business Process Automation project an organization needs to understand the concept of Business Process Management and the problems that may arise. This usually requires a team of experts to help, evaluate and perform such tasks. The purpose of this paper is to present the overall approach and the specific steps that were taken by the authors to record, manage, re-engineer and automate a few selected processes from the Municipality of Kalamaria.
Modern Internet of Things (IoT) networks including vehicle networks face an increased demand for ... more Modern Internet of Things (IoT) networks including vehicle networks face an increased demand for security and access control with respect to privacy for sensitive data. Data manipulation and tampering of emissions values due to the economic incentives and environmental and health issues require a tamper-proof solution with the use of blockchain (BC) where the integrity of data is ensured. In this paper, we propose the integration of a public permissioned Self-Sovereign Identities (SSI) framework with a permissioned consortium BC based architecture. This innovatively supports the decentralization of the authentication and authorization processes to overcome the single point of failure problems and the use of SSI to assign identities to IoT devices. Additionally, it gives full control to the holders for their identities, whether they are humans, organizations or smart vehicles. With the practice of advanced zero-knowledge proof (ZKP) cryptographic techniques, the exposure of sensitive and private information is minimized to the absolute necessary and gains in performance and scalability are achieved. Furthermore, the way this ecosystem of technologies is combined guarantees a trusted environment for enabling and automating vehicles’ emissions certification according to emissions standards and regulations. Detailed descriptions of the processes required to integrate Hyperledger Indy (HLI) SSIs to authenticate and authorize entities on a Hyperledger Fabric (HLF) network are being quoted.
Business processes are the driving force of organizations regardless of their size, type or age. ... more Business processes are the driving force of organizations regardless of their size, type or age. There are some processes that are explicit, formal and well documented and others that are in tacit and informal form. Processes are usually complex and require deep knowledge to understand them. For this reason, Business Process Management is a priority for organizations worldwide. Domain Specific Languages are programming languages that are designed to be implemented in specific fields. This paper introduces an open source toolset that will facilitate the reuse of processes in both the public and private sector through a Domain Specific Language and an Integrated Development Environment with a dedicated graphical tool for users that have no previous experience in modeling processes.
The main aim of this pilot study is to investigate management anti-patterns encountered in IT inn... more The main aim of this pilot study is to investigate management anti-patterns encountered in IT innovation projects, in the long run. A quantitative research methodology was chosen. A group of software project managers in industrial innovation projects were requested to fill in a questionnaire. The collected data revealed anti-patterns, which were compared and contrasted to the anti-patterns mostly found in traditional software projects. Some anti-patterns encountered in conventional software projects were also identified in innovation projects. Additionally, a new possible anti-pattern was identified and further investigated. The new anti-pattern regards the management of team creativity and is considered as an anti-pattern, because it can be an obstacle in teamwork progress, having negative consequences. A remedy solution is recommended as a re-factoring and recovering management strategy. Overall, this pilot study offers a set of practical guidelines for project managers, and innovation project managers in particular; this is a current IT management need that must be addressed in the near future. Further, there is a gap of relevant knowledge in the field and there are no similar studies regarding software project management anti-patterns in innovation projects in the literature. Therefore, this work could be considered as the first ever pilot research study, which investigates and reports on anti-patterns in innovation projects. Finally, we mention our future plans and outline how this initial data gathering can be useful for constructing a research project to find out more on the above research needs and IT development metarequirements.
Blockchain technology back in 2009 was mainly used for finance use cases due to the cryptocurrenc... more Blockchain technology back in 2009 was mainly used for finance use cases due to the cryptocurrency support of the Bitcoin and the Ethereum networks. Nowadays with the emergence of business oriented distributed ledger frameworks we can find blockchain (BC) in almost every aspect of our everyday real-life transactions. Starting with supply chain, BC has been used to support and secure education, e-government, real estate, insurance, healthcare and other business cases. Regarding blockchain in supply chain, examples as the Walmart and IBM partnership shows that smart contracts (SC) and cryptocurrencies can disrupt the way suppliers, shippers, retailers and customers trust each other and interact. This paper describes how we applied BC technology in two real-life supply chain scenarios. The first one is for logging and tracing products, showing how we can use SCs to identify the ingredients of food products and how to uniquely identify the food product throughout its shipment from the factory to the customer who purchase it. Important aspects of this route is the transparency of the process as well as the verification of transport. The second one deals with how authentication works for users holding BC identities. The identity of a user is important in order to secure the network, allowing only permissioned parties to access it and perform actions on the data. As long as the network is private and immutable, authenticating and authorizing users is crucial for enforcing the end-to-end security to increase users' trust and protect the confidentiality of data. While exploring these two scenarios we define the actors, the transactions these actors can perform on the systems and we propose the SCs that have to be implemented for these use cases to take advantage of BC's unique characteristics, as immutability and non-repudiation. In addition, we provide sample template SCs for both scenarios.
Before initiating a Business Process Re-engineering and Business Process Automation project an or... more Before initiating a Business Process Re-engineering and Business Process Automation project an organization needs to understand the concept of Business Process Management and the problems that may arise. This usually requires a team of experts to help, evaluate and perform such tasks. The purpose of this paper is to present the overall approach and the specific steps that were taken by the authors to record, manage, re-engineer and automate a few selected processes from the Municipality of Kalamaria.
Modern Internet of Things (IoT) networks including vehicle networks face an increased demand for ... more Modern Internet of Things (IoT) networks including vehicle networks face an increased demand for security and access control with respect to privacy for sensitive data. Data manipulation and tampering of emissions values due to the economic incentives and environmental and health issues require a tamper-proof solution with the use of blockchain (BC) where the integrity of data is ensured. In this paper, we propose the integration of a public permissioned Self-Sovereign Identities (SSI) framework with a permissioned consortium BC based architecture. This innovatively supports the decentralization of the authentication and authorization processes to overcome the single point of failure problems and the use of SSI to assign identities to IoT devices. Additionally, it gives full control to the holders for their identities, whether they are humans, organizations or smart vehicles. With the practice of advanced zero-knowledge proof (ZKP) cryptographic techniques, the exposure of sensitive and private information is minimized to the absolute necessary and gains in performance and scalability are achieved. Furthermore, the way this ecosystem of technologies is combined guarantees a trusted environment for enabling and automating vehicles’ emissions certification according to emissions standards and regulations. Detailed descriptions of the processes required to integrate Hyperledger Indy (HLI) SSIs to authenticate and authorize entities on a Hyperledger Fabric (HLF) network are being quoted.
Business processes are the driving force of organizations regardless of their size, type or age. ... more Business processes are the driving force of organizations regardless of their size, type or age. There are some processes that are explicit, formal and well documented and others that are in tacit and informal form. Processes are usually complex and require deep knowledge to understand them. For this reason, Business Process Management is a priority for organizations worldwide. Domain Specific Languages are programming languages that are designed to be implemented in specific fields. This paper introduces an open source toolset that will facilitate the reuse of processes in both the public and private sector through a Domain Specific Language and an Integrated Development Environment with a dedicated graphical tool for users that have no previous experience in modeling processes.
Uploads
Papers by IOANNIS STAMELOS