A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using ethnographic methods to carry out human factors research in software engineering
2006
Behavior Research Methods
The aim of this research was to uncover the effects of the interplay of different personality types, as measured by a test based on the Myers-Briggs Type Indicator (MBTI), on the workings of an SE team ...
This article describes how ethnographic methods were used to observe and analyze student teams working on software engineering (SE) projects. ...
One of the key strengths of this method is that it allows one to gain an "inside" account of the lives of people under observation. ...
doi:10.3758/bf03192804
pmid:17186760
fatcat:32i2dvcbira6rjhsyawvendjnm
Ignoring "Best Practice": Why Irish Software SMEs are Rejecting CMMI and ISO 9000
2009
Australasian Journal of Information Systems
There is an interesting mix of companies who were using XP and it ranged across all company size sectors. ...
In cases where XP replaced an existing process, the predecessor had a much greater Documentation requirement. ...
doi:10.3127/ajis.v16i1.557
fatcat:n6gaeyj2z5eo7efw3wippre66u
The influence of perceived medical risks and psychosocial concerns on photoprotection behaviours among adults with xeroderma pigmentosum: a qualitative interview study in the UK
2019
BMJ Open
Only the 'integrated' group achieved an equilibrium between perceived 'necessity' and 'concerns'.ConclusionsThe personal balance between perceived risks of UVR and social/psychological 'concerns' led to ...
differing behavioural responses and contributes to an understanding of adaptation and normalisation in chronic illness. ...
The authors also thank the clinical specialist XP team at St Thomas' Hospital for helpful discussions and specialist nurses Tanya Henshaw and Sally Turner for adherence data. ...
doi:10.1136/bmjopen-2018-024445
pmid:30782905
pmcid:PMC6377541
fatcat:fkgvvgcqbjdz3fzokfial5kfra
Five Agile Factors: Helping Self-management to Self-reflect
[chapter]
2011
Communications in Computer and Information Science
To test this survey tool and its alignment with existing studies, we have executed an empirical validation of the tool with 79 individuals and 8 international Scrum teams. ...
In this paper a tool is proposed to foster reflection in agile software development teams. ...
Our objective is to promote discussion inside agile teams through the adoption of an impersonal survey tool in order to better understand mechanisms of effective teamwork and organizational requirements ...
doi:10.1007/978-3-642-22206-1_8
fatcat:gx7w4t72a5dehpseswnuaafmbq
Engineering for a Science-Centric Experimentation Platform
[article]
2019
arXiv
pre-print
Netflix is an internet entertainment service that routinely employs experimentation to guide strategy around product innovations. ...
Having a multilingual framework makes Netflix XP inclusive to scientists from different backgrounds. rpy2 [17] has enabled the use of R inside a python framework by embedding an R process, but sharing ...
Therefore, the Netflix XP engineering team developed optimizations to scale modeling, so that the stack can still serve production and also offer local computation. ...
arXiv:1910.03878v1
fatcat:iqni5key7najrnqhzdqtbiz3xq
Engineering for a science-centric experimentation platform
2020
Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice
Netflix is an internet entertainment service that routinely employs experimentation to guide strategy around product innovations. ...
Having a multilingual framework makes Netflix XP inclusive to scientists from different backgrounds. rpy2 [20] has enabled the use of R inside a python framework by embedding an R process, but sharing ...
Therefore, the Netflix XP engineering team developed optimizations to scale modeling, so that the stack can still serve production and also offer local computation. ...
doi:10.1145/3377813.3381349
dblp:conf/icse/DiamantopoulosW20
fatcat:caqzbwl4izazzgns2tqzlt2x3u
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition
2018
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
The game involved the participation of 6 teams consisting of 4 students who competed with each other for a period of 5 days. ...
In addition to expected malicious behaviors, students explored various defensive and offensive strategies such as denial of service attacks and obfuscation techniques, in an effort to get ahead in the ...
The data were collected using an internal tool for file system audit of Windows machines of various versions (i.e., XP, 7, 8, and 8.1). ...
doi:10.22667/jowua.2018.03.31.054
dblp:journals/jowua/HarilalTHCGMO18
fatcat:htc5qx4j2ve5xcmxuguineqot4
TWOS
2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats - MIST '17
For the case of malicious behavior, we designed sessions for two types of insider threats (masqueraders and traitors). ...
The game involved the participation of 6 teams consisting of 4 students who competed with each other for a period of 5 days, while their activities were monitored considering several heterogeneous sources ...
Attacker Model According to [48] , we can classify an "insider attack" as one that is initiated by an entity already inside the security perimeter (the "insider"). ...
doi:10.1145/3139923.3139929
dblp:conf/ccs/HarilalTCGHO17
fatcat:4xxa6htgrjdwdpbyys23ctraty
An Empirical and Modeling Approach to Knowledge Management Practices in South American Organizations
[chapter]
2012
New Research on Knowledge Management Applications and Lesson Learned
( 2 (2) 5. 84 .054 xp ). ...
Hence, there was an overlap both from a cultural point of view and from a business one. Argentina would be the only exception but not enough data was collected to make a separate analysis. ...
doi:10.5772/33499
fatcat:jgbvuqt7tfaffmwu2b3hycbovi
How to steer an embedded software project: tactics for selecting the software process model
2005
Information and Software Technology
An appropriate process model helps coping with the challenges, and prevents many potential project problems. On the other hand, an unsuitable process choice causes additional problems. ...
How to steer an embedded software project: tactics for selecting the software process model. Information and Software Technology, volume 47, number 9, pages 587-608. ...
Acknowledgements The authors would like to thank Tuomo Kähkönen (Nokia Corporation) for reviewing an earlier version of this paper. ...
doi:10.1016/j.infsof.2004.11.001
fatcat:tiw4ixdonvetpdpi345v2mj2oi
Reality is our laboratory: communities of practice in applied computer science
2007
Behavior and Information Technology
The student teams are connected to each other and to their supervisors in academia and practice through a community-system. ...
By integrating student teams into the communities of practice of local start-ups, we offer learning opportunities to students, companies, and academia. ...
XP seemed to be more appropriate for short-term software development projects within smaller teams. • The course was accompanied by six students from the department of organizational psychology, which ...
doi:10.1080/01449290600811636
fatcat:kbnabij7ybevdjgmvnejtcz7eu
Video Collaboratories for Research and Education: An Analysis of Collaboration Design Patterns
2008
IEEE Transactions on Learning Technologies
The current architecture of WebDIVER has three parts: 1) a video transcoding server (Windows XP and FFMPEG), 2) application servers that are WAMP XP-based (Windows XP, Apache Web Server, MySQL database ...
others who view the dive. ...
doi:10.1109/tlt.2009.5
fatcat:qjoid24bmvdbhfeulx2wnx3iby
Bend it like Beckham: Embodying the Motor Skills of Famous Athletes
2006
Quarterly Journal of Experimental Psychology
Thus, because the participants are clearly far inferior tennis and soccer players than are the presented athletes, viewing an expert soccer or tennis player might slow down foot and hand responses, respectively ...
If they committed an error or did not react in the given response interval of 1,500 ms an error message was displayed. ...
doi:10.1080/17470210600917801
pmid:17095484
pmcid:PMC2080579
fatcat:uzk3duytavg3zj3zijxrcvazdq
Software Process in Practice: A Grounded Theory of the Irish Software Industry
[chapter]
2006
Lecture Notes in Computer Science
Many companies substituted verbal Communication for Documentation, and co-located their development teams in an effort to reduce process cost. ...
To support the semi-structured interviewing process, an interview guide, based on the researchers' experience as 'cultural insiders' and their prior familiarity with the literature, was created for use ...
doi:10.1007/11908562_4
fatcat:uyeagidhlbdexcmbcw5dwh6yti
REVEDERE Distributed Support System for Code Review Process
2015
International Journal of Computer Applications
TESTING
FURTHER DEVELOPMENT The study and application started as an idea inside a team of developers that use e-mails and Mercurial repositories to handle the code review process. ...
Some psychological aspects can be used to optimize the code review flows. ...
doi:10.5120/20216-2488
fatcat:iu6qid2je5cyna6dafdd4yurlu
« Previous
Showing results 1 — 15 out of 1,534 results