Example in practice: In European Railway Business (Signalling) we have to follow specific Safety Standards (according to CENELEC). An important aspect is the data transfer in closed transmission systems. One out of many techniques/measurements to avoid failures resp. detect failures in order to mitigate consequences is the usage of CRC codes.
The challenge was to find CRC codes which are with respect to their error detection properties appropriate for the specific application and which also follow the requirements of the Standard (EN 50159-1), namely to be a proper resp. good CRC code.
Note: A CRC code is proper if the undetected error probability $P_{ud}(C,\varepsilon)$ of the Code is an increasing function of the bit-error probability $\varepsilon$ for $\varepsilon \in [0,\frac{1}{2}]$. It can therefore be estimated by
$$P_{ud}(C,\varepsilon)\leq P_{ud}(C,\frac{1}{2})$$
which makes it suitable for further calculations. Goodness of a CRC is a somewhat weaker property.
Some important aspects:
Message data length: The block length of the input data on which the CRC is calculated is crucial for the quality of the error detection capabilities. It turns out that the minimum Hammingdistance $d_{min}(n)$ of data with block length $n$ should be maximised (see e.g. Optimum Cyclic Redundancy-Check Codes with 16-Bit Redundancy (1990) from Castagnoli etal.
Properness, Goodness: are properties of the CRC code which are also dependent on the message data length
Usage of Standard CRCs is not always the best choice.
Some CRCs were designed for a specific usage and therefore appropriate for a small range of applications only. The internet community has sometimes adopted such a CRC and so it became a standard or de facto standard. Research starting in the $90$s has revealed some better alternatives. This was also possible due to the increasing computer power. See e.g. the paper Undetected error probability performance of cyclic redundancy-check codes of 16-bit redundancy (2000) from Baicheva, etal.
Koopman presented some interesting papers (e.g. Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks (2004).
Here's a nice tutorial Techniques for aviation from Koopman ($2012$) regarding this theme.
Note: In fact we've studied many papers (and other sources) in order to make finally a suitable choice.
Note: Some time ago I've posted a different checksum problem. But, maybe it's too simple and not the type of cryptographic info you are looking for.