{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T13:53:27Z","timestamp":1763042007884,"version":"3.45.0"},"reference-count":91,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software"],"abstract":"<jats:p>The integration of modern artificial intelligence into software systems presents transformative opportunities and novel challenges for software quality assurance (SQA). While AI enables powerful enhancements in testing, monitoring, and defect prediction, it also introduces non-determinism, continuous learning, and opaque behavior that challenge traditional quality and reliability paradigms. This paper proposes a framework for addressing these issues, drawing on concepts from systems theory. We argue that AI-enabled software systems should be understood as dynamical systems, i.e., stateful adaptive systems whose behavior depends on prior inputs, feedback, and environmental interaction, as well as components embedded within broader socio-technical ecosystems. From this perspective, quality assurance becomes a matter of maintaining stability by enforcing constraints as well as designing robust feedback and control mechanisms that account for interactions across the full ecosystem of stakeholders, infrastructure, and operational environments. This paper outlines how the systems-theoretic perspective can inform the development of modern SQA processes. This ecosystem-aware approach repositions software quality as an ongoing, systemic responsibility, especially important in mission-critical AI applications.<\/jats:p>","DOI":"10.3390\/software4040030","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:57:13Z","timestamp":1763038633000},"page":"30","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Quality Assurance and AI: A Systems-Theoretic Approach to Reliability, Safety, and Security"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6535-7770","authenticated-orcid":false,"given":"Joseph R.","family":"Laracy","sequence":"first","affiliation":[{"name":"Department of Systematic Theology, Department of Mathematics and Computer Science, Seton Hall University, 400 South Orange Avenue, South Orange, NJ 07079, USA"}]},{"given":"Ziyuan","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Science and Technology, Quincy University, 1800 College Ave, Quincy, IL 62301, USA"}]},{"given":"Vassilka D.","family":"Kirova","sequence":"additional","affiliation":[{"name":"Department of Informatics, New Jersey Institute of Technology, Newark, NJ 07102, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6310-9597","authenticated-orcid":false,"given":"Cyril S.","family":"Ku","sequence":"additional","affiliation":[{"name":"Department of Computer Science, William Paterson University, 300 Pompton Road, Wayne, NJ 07470, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1514-9866","authenticated-orcid":false,"given":"Thomas J.","family":"Marlowe","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Seton Hall University, 400 South Orange Avenue, South Orange, NJ 07079, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MS.2016.68","article-title":"DevOps","volume":"33","author":"Ebert","year":"2016","journal-title":"IEEE Softw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MS.2022.3213285","article-title":"DevOps in Practice","volume":"40","author":"Ebert","year":"2023","journal-title":"IEEE Softw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"45252","DOI":"10.1109\/ACCESS.2025.3547932","article-title":"Extensive Review of Threat Models for DevSecOps","volume":"13","author":"Nagasundari","year":"2025","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MS.2023.3291655","article-title":"Software Engineering Education for Technical Engineering Degrees: A Comparison with the Needs of Robotics Software Engineering Education","volume":"40","author":"Daun","year":"2023","journal-title":"IEEE Softw."},{"key":"ref_5","unstructured":"(2025, October 21). The Transformative Impact of AI in Software Development: A Survey-Based Analysis. Available online: https:\/\/techreviewer.co\/blog\/the-transformative-impact-of-ai-in-software-development-a-survey-based-analysis."},{"key":"ref_6","unstructured":"Shani, I. (2025, October 21). Survey Reveals AI\u2019s Impact on the Developer Experience. Available online: https:\/\/github.blog\/news-insights\/research\/survey-reveals-ais-impact-on-the-developer-experience\/."},{"key":"ref_7","first-page":"48714","article-title":"RMMM: A Survey","volume":"9","author":"Patel","year":"2017","journal-title":"Int. J. Curr. Res."},{"key":"ref_8","first-page":"162","article-title":"System Dynamics Applied to the Modelling of Software Projects","volume":"15","author":"Waeselynck","year":"1994","journal-title":"Softw. Concepts Tools"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"033124","DOI":"10.1063\/1.3187791","article-title":"Computer Systems Are Dynamical Systems","volume":"19","author":"Mytkowicz","year":"2009","journal-title":"Chaos"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1109\/TSMCC.2012.2208187","article-title":"Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs","volume":"42","author":"Kanaskar","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"ref_11","unstructured":"Chemnitz, D., Engel, M., Kuehn, C., and Kuntz, S.-V. (2025). A Dynamical Systems Perspective on the Analysis of Neural Networks. arXiv."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/321738.321743","article-title":"Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment","volume":"20","author":"Liu","year":"1973","journal-title":"J. ACM"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/12.919277","article-title":"Weakly Hard Real-Time Systems","volume":"50","author":"Bernat","year":"2001","journal-title":"IEEE Trans. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2003.1183950","article-title":"A Fault-Tolerant Scheduling Algorithm for Real-Time Periodic Tasks with Possible Software Faults","volume":"52","author":"Han","year":"2003","journal-title":"IEEE Trans. Comput."},{"key":"ref_15","unstructured":"Thomer, J.L. (2007). Trust-Based Design of Human-Guided Algorithms. [Master\u2019s Thesis, Massachusetts Institute of Technology]."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/3737610","article-title":"AI and Trust","volume":"68","author":"Schneier","year":"2025","journal-title":"Commun. ACM"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Laporte, C.Y., and April, A. (2018). Software Quality Assurance, Wiley-IEEE Press.","DOI":"10.1002\/9781119312451"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Winkler, D., Biffl, S., Mendez, D., and Bergsmann, J. (2020). Software Quality: Quality Intelligence in Software and Systems Engineering (Proceedings of the 12th International Conference, SWQD 2020), Springer.","DOI":"10.1007\/978-3-030-35510-4"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"106969","DOI":"10.1016\/j.infsof.2022.106969","article-title":"A Deep Learning-Based Automated Framework for Functional User Interface Testing","volume":"150","author":"Khaliq","year":"2022","journal-title":"Inf. Softw. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/s10270-024-01211-y","article-title":"Bridging MDE and AI: A Systematic Review of Domain-Specific Languages and Model-Driven Practices in AI Software Systems Engineering","volume":"24","author":"Berardinelli","year":"2025","journal-title":"Softw. Syst. Model."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TSE.1985.232177","article-title":"Software Reliability Models: Assumptions, Limitations, and Applicability","volume":"11","author":"Goel","year":"1985","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_22","unstructured":"Lyu, M.R. (1996). Handbook of Software Reliability Engineering, McGraw-Hill."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Pham, H. (2006). System Software Reliability, Springer.","DOI":"10.1007\/1-84628-295-0"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Yamada, S. (2014). Software Reliability Modeling: Fundamentals and Applications, Springer.","DOI":"10.1007\/978-4-431-54565-1"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Jiang, R. (2015). Introduction to Quality and Reliability Engineering, Springer.","DOI":"10.1007\/978-3-662-47215-6"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Verma, A.K., Ajit, S., and Karanki, D.R. (2016). Reliability and Safety Engineering, Springer.","DOI":"10.1007\/978-1-4471-6269-8"},{"key":"ref_27","unstructured":"Leveson, N.G. (1995). Safeware: System Safety and Computers, Addison-Wesley."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Laracy, J.R., and Leveson, N.G. (2007, January 16\u201317). Applying STAMP to Critical Infrastructure Protection. Proceedings of the 2007 IEEE Conference on Technologies for Homeland Security, Woburn, MA, USA.","DOI":"10.1109\/THS.2007.370048"},{"key":"ref_29","unstructured":"(2025, July 23). Carnegie Mellon University\u2014Software Engineering Institute, Example of a Fault Tree. Available online: https:\/\/www.sei.cmu.edu\/media\/images\/figure_1_example_of_a_fault_tree.original.png."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TDSC.2004.1","article-title":"A Systems-Theoretic Approach to Safety in Software-Intensive Systems","volume":"1","author":"Leveson","year":"2004","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S0925-7535(03)00047-X","article-title":"A New Accident Model for Engineering Safer Systems","volume":"42","author":"Leveson","year":"2004","journal-title":"Saf. Sci."},{"key":"ref_32","unstructured":"Dulac, N., Owens, B., Leveson, N., Barrett, B., Carroll, J., Cutcher-Gershenfeld, J., Friedenthal, S., Laracy, J., and Sussman, J. (2007). Demonstration of a New Dynamic Approach to Risk Analysis for NASA\u2019s Constellation Program\u2014MIT CSRL Final Report to the NASA ESMD Associate Administrator, Massachusetts Institute of Technology."},{"key":"ref_33","unstructured":"Forrester, J.W. (1961). Industrial Dynamics, MIT Press."},{"key":"ref_34","unstructured":"Forrester, J.W. (1968). Principles of Systems, Pegasus Communications."},{"key":"ref_35","unstructured":"Forrester, J.W. (1969). Urban Dynamics, Pegasus Communications, Inc."},{"key":"ref_36","unstructured":"Forrester, J.W. (1971). World Dynamics, Wright-Allen Press."},{"key":"ref_37","unstructured":"Sterman, J.D. (2000). Business Dynamics: Systems Thinking and Modeling for a Complex World, McGraw-Hill Education."},{"key":"ref_38","unstructured":"Wiener, N. (1965). Cybernetics, or Control and Communication in the Animal and the Machine, The MIT Press. [2nd ed.]."},{"key":"ref_39","unstructured":"Schaefer, K.E. (1964). Biological Computers. Bioastronautics, MacMillan and Co."},{"key":"ref_40","unstructured":"von Foerster, H., White, J.D., Peterson, L.J., and Russell, J.K. (1968). The Cybernetics of Cybernetics. Purposive Systems, Spartan Books."},{"key":"ref_41","unstructured":"Abramovitz, R., and von Foerster, H. (1974). Cybernetics of Cybernetics: Or, the Control and the Communication of Communication, Biological Computer Laboratory at the University of Illinois."},{"key":"ref_42","unstructured":"von Foerster, H. (1981). Observing Systems, Intersystems Publications."},{"key":"ref_43","unstructured":"Dulac, N. (2007). A Framework for Dynamic Safety and Risk Management Modeling in Complex Engineering Systems. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_44","unstructured":"Zipkin, D.S. (2005). Using STAMP to Understand Recent Increases in Malicious Software Activity. [Master\u2019s Thesis, Massachusetts Institute of Technology]."},{"key":"ref_45","unstructured":"Laracy, J.R. (2007). A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System. [Master\u2019s Thesis, Massachusetts Institute of Technology]."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/3724077","article-title":"Balancing Secrecy and Transparency in Bug Bounty Programs","volume":"68","author":"Telang","year":"2025","journal-title":"Commun. ACM"},{"key":"ref_47","first-page":"75","article-title":"A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System","volume":"10","author":"Laracy","year":"2017","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"ref_48","first-page":"35","article-title":"Systems Theory and Information Security: Foundations for a New Educational Approach","volume":"5","author":"Laracy","year":"2018","journal-title":"Inf. Secur. Educ. J."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Strogatz, S.H. (2024). Nonlinear Dynamics and Chaos, Chapman and Hall\/CRC.","DOI":"10.1201\/9780429398490"},{"key":"ref_50","unstructured":"Owens, B.D. (2009). Using Phase Space Attractors to Evaluate System Safety Constraint Enforcement: Case Study in Space Shuttle Mission Control Procedure Rework. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Mens, T., De Roover, C., and Cleve, A. (2023). Software Ecosystems: Tooling and Analytics, Springer International Publishing.","DOI":"10.1007\/978-3-031-36060-2"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Marlowe, T.J., Herbert-Berger, K.G., and Ku, C.S. (2025). The Interaction of Ecology and Computing and Its Ethical Consequences. Theol. Sci., 1\u201323.","DOI":"10.1080\/14746700.2025.2550550"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Islam, M., Khan, F., Alam, S., and Hasan, M. (November, January 31). Artificial Intelligence in Software Testing: A Systematic Review. Proceedings of the TENCON 2023\u20142023 IEEE Region 10 Conference (TENCON), Chiang Mai, Thailand.","DOI":"10.1109\/TENCON58879.2023.10322349"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Alenezi, M., and Akour, M. (2025). AI-Driven Innovations in Software Engineering: A Review of Current Practices and Future Directions. Appl. Sci., 15.","DOI":"10.3390\/app15031344"},{"key":"ref_55","unstructured":"Arai, K. (2025). The Future of Software Testing: AI\u2013Powered Test Case Generation and Validation. Intelligent Computing: Proceedings of the 2025 Computing Conference, London, UK, 19\u201320 June 2025, Springer Nature."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10664-021-10066-6","article-title":"Test Case Selection and Prioritization Using Machine Learning: A Systematic Literature Review","volume":"27","author":"Pan","year":"2021","journal-title":"Empir. Softw. Eng."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MC.2024.3363808","article-title":"Assured Autonomy Through Combinatorial Methods","volume":"57","author":"Kuhn","year":"2024","journal-title":"IEEE Comput."},{"key":"ref_58","unstructured":"Mishra, D., Yang, X.S., Unal, A., and Jat, D.S. (2024). Predicting Software Faults Using Machine Learning Techniques: An Empirical Study. Proceedings of the Data Science and Big Data Analytics, Indore, India, 12\u201313 July 2024, Springer Nature."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Yang, D., Simoulin, A., Qian, X., Liu, X., Cao, Y., Teng, Z., and Yang, G. (2025). DocAgent: A Multi-Agent System for Automated Code Documentation Generation. arXiv.","DOI":"10.18653\/v1\/2025.acl-demo.44"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"105596","DOI":"10.1016\/j.ssci.2021.105596","article-title":"Systems Theoretic Accident Model and Process (STAMP): A Literature Review","volume":"152","author":"Zhang","year":"2022","journal-title":"Saf. Sci."},{"key":"ref_61","unstructured":"Park, J.C., Arase, Y., Hu, B., Lu, W., Wijaya, D., Purwarianti, A., and Krisnadhi, A.A. (2023). Faithful Chain-of-Thought Reasoning. Proceedings of the 13th International Joint Conference on Natural Language Processing and the 3rd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics (Volume 1: Long Papers), Nusa Dua, Bali, 1\u20134 November 2023, Association for Computational Linguistics."},{"key":"ref_62","unstructured":"Leng, J., Cohen, C.A., Zhang, Z., Xiong, C., and Cohen, W.W. (2025). Semi-Structured LLM Reasoners Can Be Rigorously Audited. arXiv."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Ikeuchi, H., Ge, J., Matsuo, Y., and Watanabe, K. (December, January 29). A Framework for Automatic Failure Recovery in ICT Systems by Deep Reinforcement Learning. Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore.","DOI":"10.1109\/ICDCS47774.2020.00170"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"de Neufville, R., and Scholtes, S. (2011). Flexibility in Engineering Design, The MIT Press. Engineering Systems.","DOI":"10.7551\/mitpress\/8292.001.0001"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1076\/iaij.4.1.26.16461","article-title":"Real Options: Dealing with Uncertainty in Systems Planning and Design","volume":"4","year":"2003","journal-title":"Integr. Assess."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"47","DOI":"10.11648\/j.ajetm.20190402.12","article-title":"A Real Options Analysis of Spacecraft Software Product Line Architectures","volume":"4","author":"Laracy","year":"2019","journal-title":"Am. J. Eng. Technol. Manag."},{"key":"ref_67","unstructured":"Leveson, N.G. (2016). Engineering a Safer World: Systems Thinking Applied to Safety, The MIT Press."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Davahli, M.R., Karwowski, W., Fiok, K., Wan, T., and Parsaei, H.R. (2021). Controlling Safety of Artificial Intelligence-Based Systems in Healthcare. Symmetry, 13.","DOI":"10.20944\/preprints202012.0313.v2"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1038\/s42256-021-00370-7","article-title":"Governing AI Safety through Independent Audits","volume":"3","author":"Falco","year":"2021","journal-title":"Nat. Mach. Intell."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"130733","DOI":"10.1109\/ACCESS.2022.3229233","article-title":"Safety Assurance of Artificial Intelligence-Based Systems: A Systematic Literature Review on the State of the Art and Guidelines for Future Work","volume":"10","author":"Neto","year":"2022","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"105566","DOI":"10.1016\/j.ssci.2021.105566","article-title":"The Past and Present of System-Theoretic Accident Model And Processes (STAMP) and Its Associated Techniques: A Scoping Review","volume":"146","author":"Patriarca","year":"2022","journal-title":"Saf. Sci."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Rababah, B., Wu, S.T., Kwiatkowski, M., Leung, C.K., and Akcora, C.G. (2024). SoK: Prompt Hacking of Large Language Models. IEEE Comput. Soc., 5392\u20135401.","DOI":"10.1109\/BigData62323.2024.10825103"},{"key":"ref_73","unstructured":"(2025, September 22). Web LLM Attacks|Web Security Academy. Available online: https:\/\/portswigger.net."},{"key":"ref_74","unstructured":"Hollnagel, E., Woods, D.D., and Leveson, N. (2006). Resilience Engineering: Concepts and Precepts, CRC Press."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/3152483","article-title":"Abstracting the Geniuses Away from Failure Testing","volume":"61","author":"Alvaro","year":"2017","journal-title":"Commun. ACM"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"111096","DOI":"10.1016\/j.jss.2021.111096","article-title":"On Misbehaviour and Fault Tolerance in Machine Learning Systems","volume":"183","author":"Myllyaho","year":"2022","journal-title":"J. Syst. Softw."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"180939","DOI":"10.1109\/ACCESS.2024.3509633","article-title":"Dependability in Embedded Systems: A Survey of Fault Tolerance Methods and Software-Based Mitigation Techniques","volume":"12","author":"Solouki","year":"2024","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Haddad, W.M., and Chellaboina, V.S. (2008). Nonlinear Dynamical Systems and Control: A Lyapunov-Based Approach, Princeton University Press.","DOI":"10.1515\/9781400841042"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Nguyen, N.T. (2010). Verifiable Adaptive Control with Analytical Stability Margins by Optimal Control Modification, American Institute of Aeronautics and Astronautics.","DOI":"10.2514\/6.2010-7770"},{"key":"ref_80","unstructured":"Isidori, A. (2013). Nonlinear Control Systems, Springer. [3rd ed.]."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Guo, B.-Z., and Zhao, Z.-L. (2016). Active Disturbance Rejection Control for Nonlinear Systems: An Introduction, Wiley.","DOI":"10.1002\/9781119239932"},{"key":"ref_82","unstructured":"(2025, October 22). ISO\/IEC 25002:2024. Available online: https:\/\/www.iso.org\/standard\/78175.html."},{"key":"ref_83","unstructured":"(2025, October 22). CMMI Institute\u2014CMMI Development. Available online: https:\/\/cmmiinstitute.com\/cmmi\/dev?utm_source=chatgpt.com."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"31829","DOI":"10.1109\/ACCESS.2025.3542630","article-title":"DevOps Integration with Capability Model Maturity Integration: A Systematic Mapping Review","volume":"13","author":"Rajab","year":"2025","journal-title":"IEEE Access"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"44476","DOI":"10.1109\/ACCESS.2021.3064867","article-title":"Quality-Aware DevOps Research: Where Do We Stand?","volume":"9","author":"Alnafessah","year":"2021","journal-title":"IEEE Access"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Elazhary, O., Storey, M.-A., Ernst, N.A., and Paradis, E. (2021, January 25\u201328). ADEPT: A Socio-Technical Theory of Continuous Integration. Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), Madrid, Spain.","DOI":"10.1109\/ICSE-NIER52604.2021.00014"},{"key":"ref_87","unstructured":"Trapp, M., Saglietti, F., Spisl\u00e4nder, M., and Bitsch, F. (2022). STPA-Driven Multilevel Runtime Monitoring for In-Time Hazard Detection. Computer Safety, Reliability, and Security, 42nd International Conference, SAFECOMP 2023, Toulouse, France, 20\u201322 September 2023, Springer International Publishing."},{"key":"ref_88","first-page":"42","article-title":"The Ethics of Artificial Intelligence in the Era of Generative AI","volume":"21","author":"Kirova","year":"2023","journal-title":"J. Syst. Cybern. Inform."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Laracy, J.R., Kirova, V.D., Ku, C.S., and Marlowe, T.J. (2025, January 6\u20138). Human Dignity and the Ethics of Artificial Intelligence: A Framework for Responsible Design and Use from the Perspective of Catholic Social Teaching. Proceedings of the 2025 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS), Evanston, IL, USA.","DOI":"10.1109\/ETHICS65148.2025.11098185"},{"key":"ref_90","unstructured":"Sotiropoulos, J., Del Rosario, R.F., Kokuykin, E., and Oakley, H. (2025). OWASP Top 10 for LLM Apps & Gen AI Agentic Security Initiative, HAL Open Science."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Muliarevych, O. (2024, January 11). Mitigating Input Prompt Attack Vulnerabilities in Systems with a Language Model Interface. Proceedings of the 2024 14th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece.","DOI":"10.1109\/DESSERT65323.2024.11122258"}],"container-title":["Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2674-113X\/4\/4\/30\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T13:47:53Z","timestamp":1763041673000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2674-113X\/4\/4\/30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":91,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["software4040030"],"URL":"https:\/\/doi.org\/10.3390\/software4040030","relation":{},"ISSN":["2674-113X"],"issn-type":[{"type":"electronic","value":"2674-113X"}],"subject":[],"published":{"date-parts":[[2025,11,13]]}}}