SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Rönkkö Kari) ;lar1:(bth)"

Sökning: WFRF:(Rönkkö Kari) > Blekinge Tekniska Högskola

  • Resultat 1-10 av 27
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Dittrich, Yvonne, et al. (författare)
  • Co-Operative Method Development revisited
  • 2005
  • Konferensbidrag (refereegranskat)abstract
    • During the last five years, we applied a research approach we call 'Co-operative Method Development' formulated on first experience with empirical research focusing especially on the social side of software engineering. This position paper summarizes the experiences and discusses the improvement and further development of this research approach based on our experiences in different research projects in co-operation with industrial partners.
  •  
3.
  • Dittrich, Yvonne, et al. (författare)
  • Cooperative method development : Combining qualitative empirical research with method, techniqueand process improvement
  • 2008
  • Ingår i: Empirical Software Engineering. - : Springer Netherlands. - 1382-3256 .- 1573-7616. ; 13:3, s. 231-260
  • Tidskriftsartikel (refereegranskat)abstract
    • The development of methods tools and process improvements is best to be based on the understanding of the development practice to be supported. Qualitative research has been proposed as a method for understanding the social and cooperative aspects of software development. However, qualitative research is not easily combined with the improvement orientation of an engineering discipline. During the last 6 years, we have applied an approach we call ‘cooperative method development’, which combines qualitative social science fieldwork, with problem-oriented method, technique and process improvement. The action research based approach focusing on shop floor software development practices allows an understanding of how contextual contingencies influence the deployment and applicability of methods, processes and techniques. This article summarizes the experiences and discusses the further development of this approach based on several research projects in cooperation with industrial partners.
  •  
4.
  • Dittrich, Yvonne, et al. (författare)
  • Talking Design : Co-Construction and Use of Representations in Software Development
  • 1999
  • Konferensbidrag (refereegranskat)abstract
    • Software development differs from other design work insofar as the object to be designed is not visible. Representations play an important role. Even as they only describe aspects of the later software, they mediate the common design work. Software engineering literature focuses on persistent representations, documents, diagrams, mock-ups, or similar things. Our article puts 'talking design', where the software is represented in utterances, sounds, and enactment, in the centre. With the help of concepts from the CSCW discourse, we conceptualise what is happening here; the collaborative object for the design talk is not given, it has to be collectively constructed. Software development can be regarded as routine co-construction. In our case the protocol of that design meeting seemed to serve as a reminder for the participants rather than as in itself representing the design decided upon. The design meeting, we focus in this article, was part of a distributed software development project, with a larger project situated in Ronneby, Sweden and a smaller one in Oulu, Finland. If important parts of design are collectively constructed during such meetings, what does that imply for co-operation, co-ordination and division of labour in software development projects? How can a common practice be developed among distributed work groups?
  •  
5.
  • Dyba, Tore, et al. (författare)
  • Qualitative research in software engineering
  • 2011
  • Ingår i: Empirical Software Engineering. - : Springer. - 1382-3256 .- 1573-7616. ; 16:4, s. 425-429
  • Tidskriftsartikel (refereegranskat)
  •  
6.
  •  
7.
  •  
8.
  • Johansson, Conny, et al. (författare)
  • Commitment as an Underlying Principle for Learning
  • 2004
  • Konferensbidrag (refereegranskat)abstract
    • The prevailingmodel of software development on which most educational programs are based is in conflict with general practice in industry. As following paper demonstrates Software Engineering education lacks an approach to teach the skills needed to master coalitions of existing recourses that are hard to control. In order to prepare students to handle unpredictable, non-technical and moving targets, an adequate curriculum is needed. Since 1990 software engineering education at Blekinge Institute of Technology has used commitment as the underlying principle for learning. This principle has made it possible to address the discrepancies between education and industry. This paper describes and evaluates our experience of using six elements of commitment in the education of software engineers.
  •  
9.
  • Larsson, Stefan, et al. (författare)
  • Law, Norms, Piracy and Online Anonymity – Practices of de-identification in the global file sharing community
  • 2012
  • Ingår i: Journal of Research in Interactive Marketing: Special Issue on Digital Piracy. - : Emerald. - 2040-7130. ; 6:4, s. 260-280
  • Tidskriftsartikel (refereegranskat)abstract
    • Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use of anonymity services with factors of age, geographical region, file-sharing frequency, etc. Findings Overall, 17.8 per cent of the respondents used a VPN or similar service (free or paid). A core of high-frequency uploaders is more inclined to use VPNs or similar services than the average file sharer. Online anonymity practices in the file-sharing community depend on how legal and social norms correlate (more enforcement means more anonymity). Research limitations/implications The web-based survey was in English and mainly attracted visitors on The Pirate Bay’s web site. This means that it is likely that those who do not have the language skills necessary were excluded from the survey. Practical implications This study adds to the knowledge of online anonymity practices in terms of traceability and identification, and therefore describes some of the conditions for legal enforcement in a digital environment. Social implications This study adds to the knowledge of how the Internet is changing in terms of a polarization between stronger means of legally enforced identification and a growing awareness of how to be more untraceable. Originality/value The scale of the survey, with over 75,000 respondents from most parts of the world, has likely not been seen before on this topic. The descriptive study of anonymity practices in the global file-sharing community is therefore likely unique.
  •  
10.
  • Petersen, Kai, et al. (författare)
  • The impact of time controlled reading on software inspection effectiveness and efficiency : a controlled experiment
  • 2008
  • Konferensbidrag (refereegranskat)abstract
    • Reading techniques help to guide reviewers during individual software inspections. In this experiment, we completely transfer the principle of statistical usage testing to inspection reading techniques for the first time. Statistical usage testing relies on a usage profile to determine how intensively certain parts of the system shall be tested from the users' perspective. Usage-based reading applies statistical usage testing principles by utilizing prioritized use cases as a driver for inspecting software artifacts (e.g., design). In order to reflect how intensively certain use cases should be inspected, time budgets are introduced to usage-based reading where a maximum inspection time is assigned to each use case. High priority use cases receive more time than low priority use cases. A controlled experiment is conducted with 23 Software Engineering M.Sc. students inspecting a design document. In this experiment, usage-based reading without time budgets is compared with time controlled usage-based reading. The result of the experiment is that time budgets do not significantly improve inspection performance. In conclusion, it is sufficient to only use prioritized use cases to successfully transfer statistical usage testing to inspections.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 27

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy