
Asif Qumer Gill- PhD
- Professor at University of Technology Sydney
Asif Qumer Gill
- PhD
- Professor at University of Technology Sydney
About
137
Publications
72,345
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,900
Citations
Introduction
Current institution
Additional affiliations
January 2020 - present
Publications
Publications (137)
With the rapid development of digital services, a large volume of personally identifiable information (PII) is stored online and is subject to cyberattacks such as Identity fraud. Most recently, the use of Artificial Intelligence (AI) enabled deep fake technologies has significantly increased the complexity of identity fraud. Fraudsters may use the...
Smart cities aim to deliver smart services that rely on emerging technologies to their users. In order for users to get the provided services, they need to share their personal information with different parties. However, sharing personal information in smart cities may impact the privacy of that information. Thus, there is a need to address privac...
The MOVE (Measuring Ontologies for Value Enhancement) is a community of academic researchers and industrial practitioners that aim to inspire research, discussion, and tools to achieve value from ontologies by measuring their impact in all fields. These measures would identify where there are gaps and overlaps within and across ontologies and the e...
It is well accepted that domain ontologies can support requirement analysis activities, particularly in detecting inconsistencies and incompleteness of requirement models. These benefits critically depend on the provision of a suitable ontology. We observe the context of supporting requirement analysis provides both opportunities and restrictions w...
Digitalisation is gaining considerable attention from enterprises aiming to improve their maturity and performance using digital enterprise architecture (EA). However, the challenge is how to assess and enhance often disconnected but related digital EA maturity and performance outcome elements. To address this research challenge, this paper propose...
The fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications. However, fog computing faces several challenges such as security, privacy, and storage. One way to address these challenges is to integrate blockchain with fog computing. There are several applications of blockchain-fog c...
The management and analytics of big data generated from IoT sensors deployed in smart buildings pose a real challenge in today’s world. Hence, there is a clear need for an IoT focused Integrated Big Data Management and Analytics framework to enable the near real-time autonomous control and management of smart buildings. The focus of this paper is o...
This Professional Development Workshop (PDW) on 'Design Science in Entrepreneurship and Innovation' gives scholars and practitioners an opportunity to learn how to conduct design science in entrepreneurship and innovation. Building on the successful PDW last year, this year's PDW aims at digging deeper into methodical aspects of the design science...
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Individual users and corporations are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity...
Identity and access management (IAM) is one of the key components of the secure enterprise architecture for protecting the digital assets of the information systems. The challenge is: How to model an integrated IAM for a secure enterprise architecture to protect digital assets? This research aims to address this question and develops an ontology ba...
A potential solution to the high failure rate in distributed agile development and enhance the success of projects is through implementing agile enterprise architecture, though the success is still to be established. The present paper empirically investigates the gap, by defining the role and commitment of implementing agile enterprise architecture...
Long term sustainability in a competitive and changing environment requires an organization to continuously learn and adapt. The ability to access and use new knowledge is contingent on the organisational absorptive capacity (AC). In this paper, we focus on how an organization’s absorptive capacity and its enterprise system practices develop and co...
Organisations are showing a keen interest in digitalisation. However, they are uncertain about how to determine the impact of digitalisation on organisation performance outcomes. This places decision-makers in a challenging position to assess the feasibility and intended performance outcomes of digitalisation. This paper aims to address this import...
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an...
roman xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Background:
Although a number of empirical studies have investigated communication challenges during recent years, we still need to discover the most critical challenges that face communication when agile development is geographically distributed. We a...
Although distributed ledger technology (DLT) systems seem to address conventional regulatory governance concerns, they also present systemic risks. This paper aims to address the risks of decentrally governed DLT systems. It achieves this by identifying regulatory controls that address the altered governance dynamics of decentralized systems. To ad...
COVID‐19 pandemic has affected every country in many ways. Its substantial economic impacts are causing businesses to fade, pushing many nations into an economic downturn. This exposes organizations worldwide to unique risks which cannot be foreseen with conventional methods of risk analysis. This research is part of a broader action design researc...
Information sharing is a critical component of a distributed and multi-actor digital ecosystem (DE). DE actors, individuals and organisations, require seamless, effective, efficient, and secure architecture for exchanging information. Traditional point-to-point and ad hoc integrations hinder the ability of DE actors to do so. The challenge is figur...
There is a need to identify requirements engineering (RE) practices that are important to global software development (GSD) project success. The objective of this paper is to report our recent empirical study results which aimed to identify the RE practices that are important to GSD projects. This study used an online survey questionnaire to elicit...
Big data ecosystems are complex data-intensive, digital–physical systems. Data-intensive ecosystems offer a number of benefits; however, they present challenges as well. One major challenge is related to the privacy and security. A number of privacy and security models, techniques and algorithms have been proposed over a period of time. The limitat...
DevOps originated in the context of the agile development aims to enable the continuous deployment of software applications in small releases. Most recently, organizations are taking a significant interest in adopting DevOps for automatically deploying IoT applications to multi-cloud. The interest is there; however, the challenge is how to achieve...
There is an increasing interest in embedding the security in the design of digital enterprise architecture (EA) modeling platform to secure the digital assets. Access control management (ACM) is one of the key aspects of a secure digital enterprise architecture modeling platform design. Typical enterprise architecture modeling approaches mainly foc...
The revolution in Internet of Things (IoT)-based devices and applications has provided smart applications for humans. These applications range from healthcare to traffic-flow management, to communication devices, to smart security devices, and many others. In particular, government and private organizations are showing significant interest in IoT-e...
Businesses find the need to adapt to changes in the dynamic and competitive environment. However, they are confronted by static business architecture (BA) modeling and artefacts, which are less likely to adapt and, thus, quickly become obsolete. This article proposes a dynamic analytics-enabled adaptive BA modeling framework to address this concern...
There is an increasing interest in the use of various digital technologies for interacting with passengers at smart airports. However, there is a need to identify and address the privacy issues that may threaten passenger’s digital information during their interactions with smart airports applications. This study applies a systematic literature rev...
There is an increasing interest in IoT-enabled smart digital systems. However, it is important to address their security concerns. This paper aims to address this need and proposes an adaptive architecture driven approach to securing IoT systems. The paper proposes IoT security principles and a foundational adaptive architecture framework. These tw...
This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling:
* the 22nd International Conference on Business Process Modeling, Development and Support, BPMDS 2021, and
* the 26th International Conference on Exploring Modeli...
Big data management and analytics, in the context of IoT (Internet of Things)-enabled smart buildings, is a challenging task. It is a diffused and complex area of knowledge due to the diversity of IoT devices and the nature of data generated by the IoT devices. Many international bodies have developed metamodels for IoT-enabled ecosystems to allow...
In a changing competitive business landscape, organizations are challenged by traditional processes and static document-driven business architecture models or artifacts. This marks the need for a more adaptive and analytics-enabled approach to business architecture. This article proposes a framework for adaptive business architecture modeling to ad...
Agile software development performance depends on active communication. Active communication is an arduous task when agile teams are geographically distributed. Agile enterprise architecture was reported to enhance such active communication and performance. There is little empirical evidence on how agile enterprise architecture can enhance communic...
Building an identity and access management (IAM) system that satisfies business needs and can evolve over time with the ever-changing business environment, is always a challenging endeavour. This calls for the need of an ontology based adaptive IAM metamodel, which can adapt to and instantiated for different situations. To achieve this objective, t...
The data-intensive digital supply chain management (SCM) ecosystems seem to be impacted by the recent changes in the regulations and advancement in technologies such as Artificial Intelligence, Big Data, Analytics, Networking, IoT including proliferation of less expensive hardware devices. There is limited guidance available on how to govern the lo...
A dynamic digital ecosystem is an interrelated network of organisations, people and/or entities that interact and collaborate for value co-creation. The challenge is how to effectively model the digital ecosystems operating in a highly complex and dynamic environment. There are several modelling approaches to choose from. There is a need to evaluat...
Information privacy is mainly concerned with the protection of personally identifiable information.
Information privacy is an arduous task, in particular, in the context of complex adaptive and multi-party
heterogeneous digital ecosystems. There is a need to identify and understand the relevant privacy laws
and standards for designing the secure di...
DevOps emerged as an important extension to support the Agile development for frequent and continuous software delivery. The adoption of Agile-DevOps for large scale enterprise agility depends on the most important human capability such as people competency and experience. Hence, academic education and professional training is key to the successful...
software systems are typically developed as an assembly of existing components. The complexity of the assessment process is due to lack of clarity on how to compare the cost of adaptation of an existing component versus the cost of developing it from scratch. Indeed, often pursuit of reuse can lead to excessive rework and adaptation, or Developing...
Efficient and effective communication (active communication) among stakeholders is thought to be central to agile development. However, in geographically distributed agile development (GDAD) environments, it can be difficult to achieve active communication among distributed teams due to challenges such as differences in proximity and time. To date,...
One of the critical information systems that enables service resilience is the service configuration information system (CiS). The fundamental challenge for organisations is the effective designing and implementation of the CiS architecture. This paper addresses this important research problem and reports insights from a completed applied action de...
The adoption of agility at a large scale often requires the integration of agile and non-agile development elements for architecting a hybrid adaptive methodology. The challenge is ”which elements or components (agile or non-agile) are relevant to develop the context-aware hybrid adaptive methodology reference architecture?” This paper addresses th...
Software practitioners have always shown a significant interest in implementing software process improvement (SPI) initiatives to ensure the delivery of quality products. Software industry and SPI methodologies have evolved over a period of time; however, still many SPI initiatives have not been successful. There is a need to understand software pr...
Researchers and practitioners have consistently reported poor requirements elicitation (RE) as one of the major reasons for information system (IS) project failures. In the last two decades, RE research and practice have focused predominantly on developing tools and techniques for business analysts (BAs) to use and improve RE; however, they have pa...
Purpose
DevOps is complex in nature. Organizations are unsure how to effectively establish a DevOps capability for the continuous delivery of information management systems. The purpose of this paper is to compile and analyze the DevOps by applying the well-known systematic literature review (SLR) approach. This review is intended to provide a kno...
Purpose
The aim of this paper is to report on the adaptive e-contract information management reference architecture using the systematic literature review (SLR) method. Enterprises need to effectively design and implement complex adaptive e-contract information management architecture to support dynamic service interactions or transactions.
Design...
Managing communication in collaborative global software development (GSD) projects is both critical and challenging. While social computing has received much attention from practitioners, social computing adoption is still an emerging research area in GSD. This research paper provides a review of the academic research in social computing and identi...
There is increasing interest in studying and applying Internet of Things (IoT) within the overall context of digital-physical ecosystems. Most recently, much has been published on the benefits and applications of IoT. The main question is: what are the key IoT architectural concerns, which must be addressed to effectively develop and implement an I...
The main difference between various formalisms of non-monotonic reasoning is the representation of non-monotonic rules. In default logic, they are represented by special expressions called defaults. In default logic, commonsense knowledge about the world is represented as a set of named defaults. The use of defaults is popular because they reduce t...
Adaptive enterprise architecture capability plays an important role in enabling complex enterprise transformations. One of the key challenges when establishing an adaptive enterprise architecture capability is identifying the enterprise context and the scope of the enterprise architecture. The objective of this paper is to develop and present an ad...
Organizations need to continuously monitor, source and process large amount of operational data for optimizing the cloud computing environment. The research problem is: what are cloud monitoring data challenges – in particular virtual CPU monitoring data? This paper adopts a Systematic Literature Review (SLR) approach to identify and report cloud m...
Resilience is the ability of an enterprise to absorb, recover and adapt from a disruption. Being resilient is a complex undertaking for enterprises operating in a highly dynamic environment and striving for continuous efficiency and innovation. The challenge for enterprises is to offer and run a customer-centric and interdependent large portfolio o...
Adaptive enterprise architecture capability plays an important role in enabling complex enterprise transformations. One of the key challenges when establishing an adaptive enterprise architecture capability is identifying the enterprise context and the scope of the enterprise architecture. The objective of this paper is to develop and present an ad...
The effective delivery of emergency information to elderly people is a challenging task. Failure to deliver appropriate information can have an adverse impact on the well-being of the elderly people. This paper addresses this challenge and proposes an IoT-enabled information architecture driven approach, which is called “Resalert”. Resalert offers...
Agile development is a highly collaborative environment, which requires active communication (i.e., effective and efficient communication) among stakeholders. Active communication in the geographically distributed agile development (GDAD) environment is difficult to achieve due to many challenges. Literature has reported that active communication p...
An adaptive service e-contract is an electronic agreement which is required to enable adaptive or agile service sourcing and provisioning. There are a number of e-contract metamodels that can be used to create a context specific adaptive service e-contract. The challenge is which one to choose and adopt for adaptive services. This paper presents a...
There is increasing interest in studying and applying geographically distributed agile development (GDAD). Much has been published on GDAD communication. There is a need to systematically review and synthesize the literature on GDAD communication challenges. Using the SLR approach and applying customized search criteria derived from the research qu...
Background:
The effective care and well-being of a community is a challenging task especially in an emergency situation. Traditional technology-based silos between health and emergency services are challenged by the changing needs of the community that could benefit from integrated health and safety services. Low-cost smart-home automation solutio...
Organizations have shown a significant interest in adopting human and communication-oriented agile practices for Global Software Development (GSD). Agile practices originated in the context of small and medium co-located project teams present a number of communication challenges when they are applied to the distributed GSD. There is a need to under...
Agile enterprise architecture artefacts are initially architected at the high-level and the details of those artefacts iteratively evolve in small project increments. There is a need to model agile enterprise architecture artefacts both at the high and low detailed level for a particular context. ArchiMate is relatively a new high-level architectur...
Service resilience in the face of constant business change is an imperative and complex task for any service organization including those in financial services. Yet, due to its systemic complexity, service resilience as a practice in most organisations is performed in an ad-hoc and inefficient manner resulting in periodic disruptions to day-to-day...
Agile methods depend on active communication and effective knowledge sharing among team members for producing high quality working software systems in short releases and iterations. However, effective communication in Distributed Agile Development (DAD) can be challenging due to a number of different factors, such as physical locations, multi-cultu...
Agile or adaptive enterprise architecture driven software development approach requires a modelling standard to describe the existing and to-be developed artifacts both at the high enterprise level and low, detailed level. However, a single modelling standard may not be used off-the-shelf to fully support the modelling needs of an adaptive enterpri...
Emergency management agencies are progressively using social media for the sourcing and distribution of disaster information. Emergency management agencies are often unsure as to how to best identify and assess social media concerns (e.g. information security, trust) which must be addressed to develop a social media-enabled disaster information man...
Business process and business process management concepts have matured over the years and new technology, concepts, standards, and solutions appear. In this chapter we will therefore focus on the current and future process trends. We will elaborate on the importance of trends, the maturity of the subject, giving a perspective on what the emerging t...
Agile provides alternative ways of working. Organizations are showing significant interest in applying agile ways of working to business process management (BPM). BPM is concerned with the automation and management of business processes. Agile ways of working can be applied to BPM planning, analysis, architecture, design, implementation, operation,...
Organizations have shown a significant interest in the adoption of emerging social technologies to support communication and collaboration needs of their Distributed Agile or Adaptive Development Environment (DADE). However, the challenge is how best to assess contemporary social technologies for supporting communication and collaboration in the DA...
Financial services technologies (FST) are core to the continuous transformation of financial services organizations (FSO). To date, however, there has been a lack of empirical research into FST adoption against the backdrop of the recent financial crisis. In this paper, we re-examine how FSO are currently positioned to take advantage of emerging FS...
The emergency management industry is showing a significant interest in the adoption of social media for sourcing and disseminating crisis information. The emergency management industry needs to identify social architecture concerns when considering the adoption of a specific social media technology. Social architecture describes the properties and...
The emergence of Software as a Service (SaaS) has made it possible to develop dynamic and complex business processes as eServices. The development of business processes as eServices (SaaS) can be assisted by the means of adaptive or agile development processes. The development of business processes in terms of SaaS require to perform SaaS requireme...
The literature is scant around the take up rates of cloud computing by organisations. Cloud computing is nonetheless expected to be a major computing paradigm in the future. The benefits of the cloud vis-à-vis outsourcing many current in-house IT services and applications – both hardware and software based, are numerous. However, governments and ma...
Trust in prior marketing research is considered to be the milestone in the dealing between two entities. Likewise, information systems’ researchers considered customer’s trust in e-Services to be an essential element in accepting such services. In the case of internet banking services (IBS) in the Jordanian context, the early stage of trust will be...
Software intensive organisations require the integration of agility, people, process, product and tool elements for establishing a hybrid adaptive software development capability. This paper presents the results of the empirical study that has been conducted to identify the important underlying characteristics of the hybrid adaptive software develo...