Failures and Repairs: An Examination of Software System Failure

Authors

  • Shoaib Ur Rahman Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author
  • Nouman Arshid Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author
  • Zulfiqar Ali Ayaz Department of Information Technology, Superior University, Lahore, 54000, Pakistan Author
  • Sadia Watara Department of Computer & Mathematical Sciences, New Mexico Highlands University Las Vegas, USA Author
  • Muhammad Waseem Iqbal Department of Software Engineering, Superior University, Lahore, 54000, Pakistan Author
  • Saleem Zubair Ahmad Department of Software Engineering, Superior University, Lahore, 54000, Pakistan Author
  • Riasat Ali Department of Computer Science, Superior University, Lahore, 54000, Pakistan Author

DOI:

https://doi.org/10.61506/01.00229

Keywords:

Software failures, incident response, software monitoring, empirical research

Abstract

The central theme of the article is to provide a better knowledge of software system failures and how to assure, maintain, and provide the support software systems that are in production. It includes the results of our search study. We conducted a qualitative analysis of thirty cases: fifteen from public incident reports and fifteen from in-depth interviews with engineers. Understanding and classifying failures as well as their identification, investigation, and mitigation were the main goals of our study. Furthermore, we obtained important analytical insights that are pertinent to the condition of practice as it is now and related problems. It is common for engineers to be unaware of the scaling limitations of the systems they support until those limits are exceeded, and failures have the potential to cascade across a system and cause catastrophic outages.We argue that the difficulties we've discovered may lead to changes in how systems are designed and supported.

References

Bhatti, S., Hamid, K., Bashir, A., zafar, zishan, raza, ahmad, & Iqbal, M. waseem. (2023). Solutions, Countermeasures, And Mitigation Methods For The Rise Of Automotive Hacking. 56, 77–99.

Collier, B., DeMarco, T., & Fearey, P. (1996). A defined process for project post mortem review. IEEE Software, 13(4), 65–72.

Hamid, K., & Iqbal, M. waseem. (2022). Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices. Computers, Materials and Continua, 74, 3795–3810.

Hamid, K., Ayub, N., Delshadi, M. A., Ibrar, M., Rahim, N. Z. A., Mahmood, Y., & Iqbal, M. W. (2024). Empowered corrosion-resistant products through HCP crystal network: A topological assistance. Indonesian Journal of Electrical Engineering and Computer Science, 34(3), Article 3.

Hamid, K., Ibrar, M., Delshadi, A. M., Hussain, M., Iqbal, M. W., Hameed, A., & Noor, M. (2024). ML-based Meta-Model Usability Evaluation of Mobile Medical Apps. International Journal of Advanced Computer Science and Applications (IJACSA), 15(1), Article 1.

Hamid, K., Iqbal, M. W., Aqeel, M., Rana, T. A., & Arif, M. (2023). Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA). In Artificial Intelligence & Blockchain in Cyber Physical Systems. CRC Press.

Hamid, K., Iqbal, M. waseem, Aqeel, M., Liu, X., & Arif, M. (2023). Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) (pp. 248–262).

Hamid, K., Iqbal, M. waseem, Muhammad, H., Basit, M., Fuzail, Z., † Z., & Ahmad, S. (2022). Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy. 250.

Hamid, K., Iqbal, M. waseem, Muhammad, H., Fuzail, Z., & Nazir, Z. (2022). Anova Based Usability Evaluation Of Kid’s Mobile Apps Empowered Learning Process. Qingdao Daxue Xuebao(Gongcheng Jishuban)/Journal of Qingdao University (Engineering and Technology Edition), 41, 142–169.

Hamid, K., Iqbal, M. waseem, Nazir, Z., Muhammad, H., & Fuzail, Z. (2022). Usability Empowered By User’s Adaptive Features In Smart Phones: The Rsm Approach. Tianjin Daxue Xuebao (Ziran Kexue Yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 55, 285–304.

Hamid, K., Muhammad, H., Basit, M., Hamza, M., Bhatti, S., & Aqeel, M. (2022). Topological Analysis Empowered Bridge Network Variants By Dharwad Indices.

Hamid, K., Muhammad, H., Iqbal, M. waseem, Bukhari, S., Nazir, A., & Bhatti, S. (2022). Ml-Based Usability Evaluation Of Educational Mobile Apps For Grown-Ups And Adults. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 41, 352–370.

Hamid, K., Muhammad, H., Iqbal, M. waseem, Nazir, A., shazab, & Moneeza, H. (2023). Ml-Based Meta Model Evaluation Of Mobile Apps Empowered Usability Of Disables. Tianjin Daxue Xuebao (Ziran Kexue Yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, 56, 50–68.

Huang, Q., Xia, X., & Lo, D. (2017). Supervised vs Unsupervised Models: A Holistic Look at Effort-Aware Just-in-Time Defect Prediction. 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), 159–170.

Iqbal, M. W., Hamid, K., Ibrar, M., & Delshadi, A. (2024). Meta-Analysis and Investigation of Usability Attributes for Evaluating Operating Systems. Migration Letters, 21, 1363–1380.

Jacob, P. M., & Prasanna, M. (2016). A Comparative analysis on Black box testing strategies. 2016 International Conference on Information Science (ICIS), 1–6.

O: Economic Development, Technological Change, and Growth. (2009). Journal of Economic Literature, 47(3), 930–945.

Rasool, N., Khan, S., Haseeb, U., Zubair, S., Iqbal, M. waseem, & Hamid, K. (2023). Scrum And The Agile Procedure’s Impact On Software Project Management. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 42, 380–392.

Salahat, M., Said, R. A., Hamid, K., Haseeb, U., Abdel Maguid Abdel Ghani, E., Abualkishik, A., Iqbal, M. W., & Inairat, M. (2023). Software Testing Issues Improvement in Quality Assurance. 2023 International Conference on Business Analytics for Technology and Security (ICBATS), 1–6.

Shimari, K., Ishio, T., Kanda, T., & Inoue, K. (2019). Near-Omniscient Debugging for Java Using Size-Limited Execution Trace. 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), 398–401.

Site Reliability Engineering [Book]. (n.d.). Retrieved April 25, 2024.

Smite, D., & Wohlin, C. (2011). Strategies Facilitating Software Product Transfers. IEEE Software, 28(5), 60–66.

Software Process Improvement. (n.d.). Retrieved April 25, 2024,

Stratila, S., Glasberg, D., & Mălăel, I. (2024). Performance Analysis of a New Vertical Axis Turbine Design for Household Usage. Engineering, Technology & Applied Science Research, 14(1).

Zanden, J. L. van . (2023). Examining the Relationship of Information and Communication Technology and Financial Access in Africa. Journal of Business and Economic Options, 10(3), 29-39.

Downloads

Published

2024-03-25

Issue

Section

Articles

How to Cite

Rahman, S. U. ., Arshid, N. ., Ayaz, Z. A. ., Watara, S. ., Iqbal, M. W. ., Ahmad, S. Z. ., & Ali, R. . (2024). Failures and Repairs: An Examination of Software System Failure. Bulletin of Business and Economics (BBE), 13(1). https://doi.org/10.61506/01.00229

Similar Articles

1-10 of 392

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)