首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Netta Iivari 《AI & Society》2009,23(4):511-528
This paper outlines a critical, textual approach for the analysis of the relationship between different actors in information technology (IT) production, and further concretizes the approach in the analysis of the role of users in the open source software (OSS) development literature. Central concepts of the approach are outlined. The role of users is conceptualized as reader involvement aiming to contribute to the configuration of the reader (to how users and the parameters for their work practices are defined in OSS texts). Afterwards, OSS literature addressing reader involvement is critically reviewed. In OSS context, the OSS writers as readers configure the reader and other readers are assumed to be capable of and interested in commenting the texts. A lack of OSS research on non-technical reader involvement is identified. Furthermore, not only are the OSS readers configured, but so are OSS writers. In OSS context while writers may be empowered, this clearly does not apply to the non-technical OSS readers. Implication for research and practice are discussed.
Netta IivariEmail:
  相似文献   

2.
《Information & Management》2003,40(4):317-324
User satisfaction (US) is probably the most studied construct in information systems (IS) research. Despite such attention, reported results regarding the relationship between US and IS success have been inconclusive and sometimes contradictory. Is it possible that something else is occurring in this relationship that has not been modeled in past studies? Perhaps user dispositional traits are confounding the results. Users may be predisposed to be either satisfied or dissatisfied in a way that has nothing to do with the system itself. This paper investigates the impact that user predispositions have on how users perceive IS. The results of the investigation indicate that there is significant relationship between user predispositions and US.  相似文献   

3.
This study investigated correlations between university students’ problematic internet use behaviors and shyness, narcissism, loneliness, aggression and self-perception. The participants were 424 students attending seven different faculties of a public university in Turkey; 215 were female and 209 male. Student’s ages ranged between 17 and 23, with a mean of 18.69. The Problematic Internet Use Scale, Shyness Scale, Narcissistic Personality Inventory, UCLA Loneliness Scale, Aggression Questionnaire, Social Comparison Scale and a Personal Data Form were used for data collection. Correlation analysis results showed positive associations between problematic internet use and shyness and aggression. No statistically significant correlation was determined between problematic internet use and narcissism, loneliness or self-perception. The results demonstrate that individuals who are problematic users are shier and more aggressive. Shyness and aggression emerged as significant antecedent variables of problematic internet use. Suggestions are made for further studies in the light of these findings.  相似文献   

4.
Programming question and answer (Q&A) websites, such as Stack Overflow, leverage the knowledge and expertise of users to provide answers to technical questions. Over time, these websites turn into repositories of software engineering knowledge. Such knowledge repositories can be invaluable for gaining insight into the use of specific technologies and the trends of developer discussions. Previous work has focused on analyzing the user activities or the social interactions in Q&A websites. However, analyzing the actual textual content of these websites can help the software engineering community to better understand the thoughts and needs of developers. In the article, we present a methodology to analyze the textual content of Stack Overflow discussions. We use latent Dirichlet allocation (LDA), a statistical topic modeling technique, to automatically discover the main topics present in developer discussions. We analyze these discovered topics, as well as their relationships and trends over time, to gain insights into the development community. Our analysis allows us to make a number of interesting observations, including: the topics of interest to developers range widely from jobs to version control systems to C# syntax; questions in some topics lead to discussions in other topics; and the topics gaining the most popularity over time are web development (especially jQuery), mobile applications (especially Android), Git, and MySQL.  相似文献   

5.
Developers commonly make use of a web search engine such as Google to locate online resources to improve their productivity. A better understanding of what developers search for could help us understand their behaviors and the problems that they meet during the software development process. Unfortunately, we have a limited understanding of what developers frequently search for and of the search tasks that they often find challenging. To address this gap, we collected search queries from 60 developers, surveyed 235 software engineers from more than 21 countries across five continents. In particular, we asked our survey participants to rate the frequency and difficulty of 34 search tasks which are grouped along the following seven dimensions: general search, debugging and bug fixing, programming, third party code reuse, tools, database, and testing. We find that searching for explanations for unknown terminologies, explanations for exceptions/error messages (e.g., HTTP 404), reusable code snippets, solutions to common programming bugs, and suitable third-party libraries/services are the most frequent search tasks that developers perform, while searching for solutions to performance bugs, solutions to multi-threading bugs, public datasets to test newly developed algorithms or systems, reusable code snippets, best industrial practices, database optimization solutions, solutions to security bugs, and solutions to software configuration bugs are the most difficult search tasks that developers consider. Our study sheds light as to why practitioners often perform some of these tasks and why they find some of them to be challenging. We also discuss the implications of our findings to future research in several research areas, e.g., code search engines, domain-specific search engines, and automated generation and refinement of search queries.  相似文献   

6.
Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred and fifty smart mobile device owners from the University of South Australia were surveyed. Not surprisingly, it was found that smart mobile device users in the survey generally underestimated the value that their collective identities have to criminals and how these can be sold. For example, participants who reported jail-breaking/rooting their devices were also more likely to exhibit risky behaviour (e.g. downloading and installing applications from unknown providers), and the participants generally had no idea of the value of their collective identities to criminals which can be sold to the highest bidder. In general, the participants did not understand the risks and may not have perceived cyber crime to be a real threat. Findings from the survey and the escalating complexities of the end-user mobile and online environment underscore the need for regular ongoing training programs for basic online security and the promotion of a culture of security among smart mobile device users. For example, targeted education and awareness programmes could be developed to inform or educate smart mobile device users and correct misconceptions or myths in order to bring about changes in attitudes and usage behaviour (e.g. not taking preventative measures such as strong passwords to protect their devices). Such initiatives would enable all end users (including senior University management who use such devices to access privileged corporate data and accounts) to maintain current knowledge of the latest cyber crime activities and the best cyber security protection measures available.  相似文献   

7.
While stereoscopic content can be compelling, it is not always comfortable for users to interact with on a regular basis. This is because the stereoscopic content on displays viewed at a short distance has been associated with different symptoms such as eye-strain, visual discomfort, and even nausea. Many of these symptoms have been attributed to cue conflict, for example between vergence and accommodation. To resolve those conflicts, volumetric and other displays have been proposed to improve the user's experience. However, these displays are expensive, unduly restrict viewing position, or provide poor image quality. As a result, commercial solutions are not readily available. We hypothesized that some of the discomfort and fatigue symptoms exhibited from viewing in stereoscopic displays may result from a mismatch between stereopsis and blur, rather than between sensed accommodation and vergence. To find factors that may support or disprove this claim, we built a real-time gaze-contingent system that simulates depth of field (DOF) that is associated with accommodation at the virtual depth of the point of regard (POR). Subsequently, a series of experiments evaluated the impact of DOF on people of different age groups (younger versus older adults). The difference between short duration discomfort and fatigue due to prolonged viewing was also examined. Results indicated that age may be a determining factor for a user's experience of DOF. There was also a major difference in a user's perception of viewing comfort during short-term exposure and prolonged viewing. Primarily, people did not find that the presence of DOF enhanced short-term viewing comfort, while DOF alleviated some symptoms of visual fatigue but not all.  相似文献   

8.
Hedge A 《Ergonomics》2000,43(7):1019-1029
This paper briefly reviews research studies of interest to environmental ergonomists. It includes some recent work on the health effects of office lighting, especially the effects of daylighting, fluorescent lighting and full-spectrum lighting. It also covers studies of indoor air quality in offices, especially investigations of localized air filtration and the sick building syndrome. It argues the value of a systematic, ergonomics approach to designing the built environment.  相似文献   

9.
With the rise of social web, there has also been a great concern about the quality of user-generated content on social media sites (SMSs). Deceptive comments harm users’ trust in online social media and cause financial loss to firms. Previous studies use various features and classification algorithms to detect and filter social spam on several social media platforms. However, to the best of our knowledge, previous studies have not exploited both probabilistic topic modeling and incremental learning to detect social spam on SMSs. Thus, the main contribution of this paper is design of a novel detection methodology that combines topic- and user-based features to improve the effectiveness of social spam detection. The proposed methodology exploits a probabilistic generative model, namely the labeled latent Dirichlet allocation (L-LDA), for mining the latent semantics from user-generated comments, and an incremental learning approach for tackling the changing feature space. An experiment based on a large dataset extracted from YouTube demonstrates the effectiveness of our proposed methodology, which achieves an average accuracy of 91.17 % in social spam detection. Our statistical analysis reveals that topic-based features significantly improve social spam detection, which has significant implications for business practice.  相似文献   

10.
Fault prediction by negative binomial regression models is shown to be effective for four large production software systems from industry. A model developed originally with data from systems with regularly scheduled releases was successfully adapted to a system without releases to identify 20% of that system’s files that contained 75% of the faults. A model with a pre-specified set of variables derived from earlier research was applied to three additional systems, and proved capable of identifying averages of 81, 94 and 76% of the faults in those systems. A primary focus of this paper is to investigate the impact on predictive accuracy of using data about the number of developers who access individual code units. For each system, including the cumulative number of developers who had previously modified a file yielded no more than a modest improvement in predictive accuracy. We conclude that while many factors can “spoil the broth” (lead to the release of software with too many defects), the number of developers is not a major influence.
Robert M. BellEmail:
  相似文献   

11.
The popularity of mobile devices has been steadily growing in recent years. These devices heavily depend on software from the underlying operating systems to the applications they run. Prior research showed that mobile software is different than traditional, large software systems. However, to date most of our research has been conducted on traditional software systems. Very little work has focused on the issues that mobile developers face. Therefore, in this paper, we use data from the popular online Q&A site, Stack Overflow, and analyze 13,232,821 posts to examine what mobile developers ask about. We employ Latent Dirichlet allocation-based topic models to help us summarize the mobile-related questions. Our findings show that developers are asking about app distribution, mobile APIs, data management, sensors and context, mobile tools, and user interface development. We also determine what popular mobile-related issues are the most difficult, explore platform specific issues, and investigate the types (e.g., what, how, or why) of questions mobile developers ask. Our findings help highlight the challenges facing mobile developers that require more attention from the software engineering research and development communities in the future and establish a novel approach for analyzing questions asked on Q&A forums.  相似文献   

12.

User participation in the design process may be an axiom of quality design but in the design of interactive, innovative computer systems, user participation may be neither feasible nor desirable. Here, user centred methodologies miss the point. If computers are a medium rather than a tool, then we need a new design paradigm that recognizes the difference between using a product and experiencing a show. In this paper the role of users in interactive systems design within the context of Multimedia product development is discussed. The main features of Multimedia product development are outlined through reference to an empirical study of two organizations and the role of users in the design process is discussed. Finally a different design paradigm is suggested.  相似文献   

13.
This paper introduces the special issue on information systems, identity and identification. In addition to introducing the papers in the special issue, it provides a state-of-the-art review of research into identity and identification to contextualise the contributions of the special issue papers. The paper reviews research themes in personal and organisational identity as well as research challenges in identification before considering the interplay between these two strands.  相似文献   

14.
With the development of new media, the issue of privacy and its determinants has become the subject of a large body of literature in recent years. The main objective of this study was to check whether loneliness is a predictor of putting private information on Facebook. The participants were 887 young people. Facebook Privacy Scale and Loneliness Scale were used. We showed that young age and loneliness are predictors of disclosure on Facebook. Moreover, junior high school students more often put private information on their Facebook profiles than senior high school and university students.  相似文献   

15.
Online opinions are one of the most important sources of information on which users base their purchasing decisions. Unfortunately, the large quantity of opinions makes it difficult for an individual to consume in a reasonable amount of time. Unlike standard information retrieval problems, the task here is to retrieve entities whose relevance is dependent upon other people’s opinions regarding the entities and how well those sentiments match the user’s own preferences. We propose novel techniques that incorporate aspect subjectivity measures into weighting the relevance of opinions of entities based on a user’s query keywords. We calculate these weights using sentiment polarity of terms found proximity close to keywords in opinion text. We have implemented our techniques, and we show that these improve the overall effectiveness of the baseline retrieval task. Our results indicate that on entities with long opinions our techniques can perform as good as state-of-the-art query expansion approaches.  相似文献   

16.
Many problems in paleontology reduce to finding those features that best discriminate among a set of classes. A clear example is the classification of new specimens. However, these classifications are generally challenging because the number of discriminant features and the number of samples are limited. This has been the fate of LB1, a new specimen found in the Liang Bua Cave of Flores. Several authors have attributed LB1 to a new species of Homo, H. floresiensis. According to this hypothesis, LB1 is either a member of the early Homo group or a descendent of an ancestor of the Asian H. erectus. Detractors have put forward an alternate hypothesis, which stipulates that LB1 is in fact a microcephalic modern human. In this paper, we show how we can employ a new Bayes optimal discriminant feature extraction technique to help resolve this type of issues. In this process, we present three types of experiments. First, we use this Bayes optimal discriminant technique to develop a model of morphological (shape) evolution from Australopiths to H. sapiens. LB1 fits perfectly in this model as a member of the early Homo group. Second, we build a classifier based on the available cranial and mandibular data appropriately normalized for size and volume. Again, LB1 is most similar to early Homo. Third, we build a brain endocast classifier to show that LB1 is not within the normal range of variation in H. sapiens. These results combined support the hypothesis of a very early shared ancestor for LB1 and H. erectus, and illustrate how discriminant analysis approaches can be successfully used to help classify newly discovered specimens.  相似文献   

17.
This study employed an online survey of politically interested Internet users during the two weeks before and the two weeks after the 2004 presidential election to compare how they judge five components of the Internet in terms of credibility for political information. Blogs were judged as the most credible with issue-oriented Web sites also judged as highly credible. Candidate Web sites and bulletin boards were only judged moderately credible while chat rooms were rated not very credible. This study also explored whether reliance on the Internet resource or motivations for visiting the source significantly predict Internet component credibility after controlling for demographic and political variables.  相似文献   

18.
《Ergonomics》2012,55(8):1667-1673
Abstract

When ergonomists contribute to the design of products and services they aim to be user-centred. This paper explores two possible meanings of user-centredness; the ergonomist may use theories and findings about human behaviour to act for the user or may help the user to participate in design. Both approaches are well known in ergonomics and they can point in conflicting directions. This paper examines the rationale for the two approaches and presents the results of a survey, which found that the most successful strategy was to mix the two approaches. It offers a classification to support the identification of the appropriate approach to adopt in different situations. The paper proposes, for example, that ‘design by users’ is the appropriate strategy when significant value judgements have to be taken in a local or bespoke design setting. By contrast a ‘design for users’ approach is appropriate for the design of generic products. An additional approach ‘design for users with users’ is introduced for settings that require knowledge about human characteristics and that need users to make value judgements.  相似文献   

19.
Software product management covers both technical and business activities to management of products like roadmaps, strategic, tactical, and release planning. In practice, one product manager is seldom responsible for all these activities but several persons share the responsibilities. Therefore, it is important to understand the boundaries of product managers’ work in managing software products, as well as the impact a product manager has on the company business. The purpose of the study is to clarify what roles of software product managers exist and understand how these roles are interrelated with each other and the whole structure and business of an organization. The study is designed as an interpretative qualitative study using grounded theory as the research method. Based on the gathered data we developed a framework that reveals the role of a product manager in the organization and shows how this role can evolve by extending the level of responsibilities. Using the framework, we identified four stereotypical roles of product managers in the studied organizations: experts, strategists, leaders, and problem solvers. The presented framework shows that product managers’ roles are not limited to the conception of the “mini-CEO.” The results allow product managers and top management to collaborate effectively by assigning responsibilities and managing expectations by having a common tool for understanding the role of product managers in the organization.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号